Full Stack and Cryptography
Full Stack and Cryptography
Processing
ANNA UNIVERSITY, CHENNAI
UNDERGRADUATE CURRICULUM (UNIVERSITY DEPARTMENTS)
Regulations: 2023 (Revised 2024), with effect from the AY 2024 – 25 to all the students of UG
Programme.
OVERVIEW OF CREDITS
Sem PCC PEC ESC HSMC ETC OEC SDC UC SLC Total
I 11 7 2 1 21
II 3 11 7 1 22
III 13 5 4 2 3 27
IV 16 4 3 0 23
V 13 3 3 3 3 1 26
13
VI 6 3 2 3 27
VII 9 7 1 17
VIII 8 8
Total 58 18 16 26 7 6 28 11 1 171
% of
Categ 33.92 10.53 9.36 15.20 4.09 3.51 16.37 6.43 0.59
ory
CATEGORY OF COURSES
SEMESTER – I
Periods /Week
தமிழர்மரபு/ Heritage of
7 UC23H01 T 1– 0– 0 1 1 UC
Tamils
8 NCC/NSS/NSO/YRC – 0– 0– 2 2 0 UC
TOTAL CREDITS 21
* TCP – Total Contact Period(s)
#TYPE OF COURSE
SEMESTER – II
8 – Audit Course I – – – – UC
TOTAL CREDITS 22
3
SEMESTER – III
PERIODS /
S. COURSE COURSE WEEK CATE
COURSE NAME CREDITS
NO. CODE TYPE# GORY
L– T– P TCP*
1 MA23C05 Probability and Statistics T 3– 1– 0 4 4 HSMC
2 CS23301 Software Engineering T 3– 0– 0 3 3 PCC
3 CS23302 Data Structures LIT 3– 0– 4 7 5 PCC
4 CS23303 Digital System Design LIT 3– 0– 4 7 5 ESC
5 CS23304 Java Programming LIT 3– 0– 4 7 5 PCC
6 Skill Development Course – I L – – 2 SDC
7 Standards – Computer Science &
CS23U01 T 1– 0– 0 1 1 UC
Engg.
8 UC23U01 Universal Human Values LIT 1– 0– 2 3 2 UC
TOTAL CREDITS 27
SEMESTER – IV
PERIODS /
S. COURSE COURSE WEEK
NO. CODE TYPE# CREDITS CATEG
COURSE NAME
L– T– P TCP* ORY
TOTAL CREDITS 23
4
TOTAL CREDITS 26
TOTAL CREDITS 6
(OR)
1. Minor Elective – I – – – – –
2. Minor Elective – II – – – – –
5
TOTAL CREDITS 27
PERIODS /
S. COURSE COURSE CATE
COURSE NAME WEEK CREDITS
NO. CODE TYPE# GORY
L– T– P TCP*
Capstone Project Phase I (Proof of
CS23D02 Concept, Implementation & CDP 0– 0– 12 12 6 SDC
1 Validation)
TOTAL CREDITS 6
(OR)
PERIODS /
CREDITS CATE
WEEK
S. COURSE COURSE GORY
COURSE NAME
NO. CODE TYPE#
L– T– P TCP*
2. Minor Elective – IV – – – – –
6
SEMESTER – VII
PERIODS /
S. COURSE COURSE WEEK CATE
COURSE NAME
NO. CODE TYPE# CREDITS
GORY
L– T– P TCP*
Emerging Technology Course I
1 LIT 3– 0– 2 5 4 ETC
TOTAL CREDITS 17
PERIODS /
WEEK
S. COURSE COURSE
COURSE NAME CREDITS CATE
NO. CODE TYPE#
L– T– P TCP* GORY
(OR)
1. Minor Elective – V – – – – –
2. Minor Elective – VI – – – – –
7
SEMESTER – VIII
PERIODS /
WEEK
S. COURSE
COURSE NAME COURSE CREDITS CATEGORY
NO. CODE
TYPE# L– T– P TCP*
TOTAL CREDITS 8
8
CLOUD
CYBER ARTIFICIAL
DATA COMPUTING
FULL STACK SECURITY CREATIVE EMERGING INTELLIGENCE
SCIENCE AND DATA
DEVELOPMENT AND DATA MEDIA TECHNOLOGIES AND MACHINE
CENTER
PRIVACY LEARNING
TECHNOLOGIES
Augmented
Exploratory Web Cloud Distributed Reality/ Virtual Knowledge
data Analysis Technologies Ethical Hacking Systems Engineering
Computing Reality
Video
Data Cloud Services Information Social Network Healthcare
Creation and Deep Learning
Warehousing Management Visualization Security Analytics
Editing
Large
UI and UX Modern Text and Speech
Data Mining Unix Internals Game Theory Language
Design Cryptography Analysis
Models
Engineering
Software
Business Storage Secure Digital Quantum Optimization
Testing and
Analytics Technologies Software Marketing Computing Techniques
Automation
Systems
Web Cryptocurrency
Image and Software Defined Social Network
Application Cyber Security Visual Effects and Block chain
Video Analytics Networks Analysis
Security Technologies
Natural
Stream Game
Language DevOps NetworkSecurity Metaverse Cognitive Science
Processing Development
Processing
PERIODS / TOTAL
S. COURSE CATE WEEK CONTACT
NO. CODE COURSE TITLE GORY L T P CREDITS
PERIODS
1. CS23001 Exploratory Data Analysis PEC 2 0 2 4 3
2. CS23002 Recommender Systems PEC 2 0 2 4 3
3. CS23003 Data Warehousing PEC 3 0 0 3 3
4. CS23004 Data Mining PEC 3 0 0 3 3
Natural Language
7. CS23007 PEC 3 0 0 3 3
Processing
8. CS23008 Big Data Analytics PEC 2 0 2 4 3
PERIODS TOTAL
S. COURSE CATE / WEEK CONTACT
NO. CODE COURSE TITLE GORY CREDITS
L T P PERIODS
PERIODS / TOTAL
S. COURSE CATE WEEK CONTACT
NO. CODE COURSE TITLE GORY CREDITS
L T P PERIODS
1 CS23019 Cloud Computing PEC 2 0 2 4 3
2. CS23020 Virtualization PEC 2 0 2 4 3
3. CS23021 Information Visualization PEC 3 0 0 3 3
4. CS23022 Unix Internals PEC 3 0 0 3 3
5. CS23023 Storage Technologies PEC 3 0 0 3 3
6. CS23024 Software Defined Networks PEC 2 0 2 4 3
PERIODS / TOTAL
S. COURSE CATE WEEK CONTACT
NO. CODE COURSE TITLE GORY CREDITS
L T P PERIODS
1 CS23028 Ethical Hacking PEC 2 0 2 4 3
2.
CS23029 Digital and Mobile Forensics PEC 2 0 2 4 3
3. CS23030 Social Network Security PEC 2 0 2 4 3
4. CS23031 Modern Cryptography PEC 2 0 2 4 3
5. Engineering Secure Software
CS23032 PEC 2 0 2 4 3
Systems
6. CS23033 Cyber Security PEC 2 0 2 4 3
7. CS23034 Network Security PEC 2 0 2 4 3
8. CS23035 Information Security PEC 3 0 0 3 3
9. Mobile Networks
CS23036 PEC 3 0 0 3 3
11
PERIODS TOTAL
S. COURSE CATE / WEEK CONTACT
CODE COURSE TITLE GORY PERIODS CREDITS
NO. L T P
COURSE PERIODS /
CODE WEEK
S. COURSE TITLE CATE TOTAL CREDITS
GORY CONTACT
NO. L T P
PERIODS
PERIODS /
S. COURSE COURSE WEEK
NO. CODE COURSE NAME TYPE# CREDITS
L– T– P TCP*
1 CS23064 Data Structures T 3– 0– 0 3 3
2 CS23065 Computer Networks T 3– 0– 0 3 3
3 CS23066 Ethical Hacking LIT 2– 0– 2 4 3
4 CS23067 Cyber Security LIT 2– 0– 2 4 3
5 CS23068 Cyber Forensics T 3– 0– 0 3 3
6 CS23069 Cryptography and Network Security T 3– 0– 0 3 3
7 CS23070 Digital and Mobile Forensics T 3– 0– 0 3 3
8 CS23071 Information Security T 3– 0– 0 3 3
PERIODS /
S. COURSE COURSE WEEK
COURSE NAME
NO. CODE TYPE# L– T– P TCP* CREDITS
OPEN ELECTIVES
(TO BE OFFERED TO OTHER DEPARTMENT)
PERIODS /
S. COURSE COURSE WEEK CREDITS
NO. CODE COURSE NAME #
TYPE L– T– P TCP
*
1 CS23901 Data Mining T 3– 0– 0 3 3
2 CS23902 Information Security T 3– 0– 0 3 3
3 CS23903 Software Project Management T 3– 0– 0 3 3
4 CS23904 Image Processing T 3– 0– 0 3 3
14
LAB ACTIVITY: 6
Listening – Telephone conversation; Speaking Self– introduction; Telephone conversation – Video
conferencing etiquette
UNIT II NARRATION 6
Reading – Comprehension strategies – Newspaper Report, An excerpt from an autobiography;
Writing – Narrative Paragraph writing (Event, personal experience etc.); Grammar – Subject– verb
agreement, Simple past, Past continuous Tenses; Vocabulary – One– word substitution
LAB ACTIVITY: 6
Listening – Travel podcast; Speaking – Narrating and sharing personal experiences through a
podcast
LAB ACTIVITY: 6
Listening – Railway / Airport Announcements, Travel Vlogs; Speaking – Describing a place or picture
description
LAB ACTIVITY: 6
Listening – Product reviews, Speaking – Product comparison based on product reviews – similarities
and differences
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
15
LAB ACTIVITY: 6
Listening – Short speeches; Speaking – Making short presentations (JAM)
TOTAL: 60 PERIODS
TEACHING METHODOLOGY
Interactive lectures, role plays, group discussions, listening and speaking labs, technology enabled
language teaching, flipped classroom.
EVALUATION PATTERN
Internal Assessment
Written assessments
Assignment
Lab assessment
Listening
Speaking
External Assessment
End Semester Examination
COURSE OUTCOMES:
By the end of the courses, students will be able to
• Use appropriate grammar and vocabulary to read different types of text and converse
appropriately.
• Write coherent and engaging descriptive and comparative essay writing.
• Comprehend and interpret different kinds of texts and audio visual materials
• Critically evaluate reviews and articulate similarities and differences
• Write formal letters and emails using appropriate language structure and format
TEXT BOOKS:
1. “English for Engineers and Technologists” Volume I by Orient Blackswan, 2022
2. “English for Science & Technology – I” by Cambridge University Press, 2023
REFERENCES
1. “Interchange” by Jack C.Richards, Fifth Edition, Cambridge University Press, 2017.
2. “English for Academic Correspondence and Socializing” by Adrian Wallwork, Springer,
2011.
3. “The Study Skills Handbook” by Stella Cortrell, Red Globe Press, 2019
4. www.uefap.com
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
16
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 √ √
CO2 √
CO3 √ √
CO4 √
CO5 √ √
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
17
General engineering applications / branch specific applications from the content of each units
wherever possible will be introduced to students.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
18
TEXT BOOKS:
1. Joel Hass, Christopher Heil, Maurice D.Weir "‘Thomas‘ Calculus", Pearson Education.,
New Delhi, 2018.
2. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, 45th Edition, New
Delhi, 2020.
3. James Stewart, Daniel K Clegg & Saleem Watson "Calculus with Early Transcendental
Functions", Cengage Learning, 6th Edition, New Delhi,2023.
REFERENCES:
1. Erwin Kreyszig, "Advanced Engineering Mathematics", 10th Edition, Wiley India Pvt Ltd.,
New Delhi, 2018.
2. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education2nd Edition,
5th Reprint, Delhi, 2009.
3. Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”,Narosa Publications,
5th Edition, New Delhi, 2017.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
19
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO1 : 3 3 2 3 1 2 1 1 1 1 1 3
CO2 : 3 3 2 3 1 2 1 1 1 1 1 3
CO3 : 3 3 2 3 1 2 1 1 1 1 1 3
CO4 : 3 3 2 3 1 2 1 1 1 1 1 3
CO5 : 3 3 2 3 1 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
20
COURSE OBJECTIVES
• To familiarize with crystal structure, bonding and crystal growth.
• To impart knowledge on Mechanics of Materials.
• To impart knowledge of oscillations, sound and Thermal Physics
• To facilitate understanding of optics and its applications, different types of Lasers and fiber optics.
• To introduce the basics of Quantum Mechanics and its importance.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
21
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
22
REFERENCES:
1. R. Wolfson, Essential University Physics. Volume 1 & 2. Pearson, 2016.
2. D. Kleppner and R. Kolenkow. An Introduction to Mechanics, McGraw Hill Education, 2017.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 1 1
CO2 3 2 1 1
CO3 3 2 1 1
CO4 3 2 1 1 1
CO5 3 2 1 1 1
CO6 3 2 1 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
23
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
24
TEXT BOOKS:
1. Kothari DP and Nagrath IJ, “Basic Electrical and Electronics Engineering”, McGraw Hill Education, Second
Editions, 2020.
2. Bhattacharya SK, “Basic Electrical and Electronics Engineering”, Pearson Education, Second
Edition,2017
3. A.K. Sawhney, Puneet Sawhney ‘A Course in Electrical & Electronic Measurements & Instrumentation’,
Dhanpat Rai and Co, 2015.
REFERENCES:
1. Rajendra Prasad ‘Fundamentals of Electrical Engineering’, Third Edition, Prentice Hall of India, 2014.
2. Sanjeev Sharma ‘Basics of Electrical Engineering’ Wiley, 2019.
3. Doebelin, E.O., Measurements Systems – Application and Design’, McGraw Hill Publishing Co, 2019.
4. D.Roy Choudhury, Shail B. Jain, Linear Integrated Circuits, New age international Publishers,
2018.
5. H.S. Kalsi, ‘Electronic Instrumentation’, Tata McGraw– Hill, New Delhi, 2010
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
25
CS23C04 PROGRAMMING IN C LT PC
2 0 4 4
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
26
TEXT BOOKS:
1. Brian W. Kernighan and Dennis M. Ritchie, "The C Programming language", 2nd Edition,
Pearson Education, 2015.
2. Yashwant Kanetkar, “Let Us C: Authentic guide to C programming language", 19th Edition, BPB
Publications, 2022.
REFERENCE BOOKS:
1. Pradip Dey and Manas Ghosh, "Computer Fundamentals and Programming in C", 2nd Edition,
Oxford University Press, 2013.
2. Ashok N Kamthane, “Programming in C”, Pearson Education, 3rd Edition, 2024.
3. Reema Thareja, "Programming in C", Oxford University Press, 3rd Edition, 2023.
4. Paul Deitel and Harvey Deitel, "C How to Program with an Introduction to C++", 8th Edition,
Pearson Education, 2018.
5. Byron S. Gottfried, "Schaum's Outline of Theory and Problems of Programming with C",
Schaum Outline Series, 1989.
6. Anita Goel and Ajay Mittal, "Computer Fundamentals and Programming in C", 1st Edition,
Pearson Education, 2019.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Write simple C programs using basic constructs.
2. Design searching and sorting algorithms using arrays and strings.
3. Implement modular applications using Functions and pointers.
4. Develop and execute applications using structures and Unions.
5. Illustrate data processing using files Total Hours: 90 (30+60)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
27
CO– PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1 2 3 3 2 3 1 1 1 2 2 1 3 3 2 3
2 2 3 3 3 3 1 1 1 2 2 1 3 3 2 3
3 2 2 3 3 3 1 1 1 2 2 2 3 3 2 3
4 2 2 3 3 3 1 1 1 2 2 2 3 3 2 3
5 2 3 3 3 3 1 1 1 3 2 2 3 3 2 3
1 – low, 2 – medium, 3 – high
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
28
Performing analytics on numeric data using any spreadsheet software and visualizing the data using
charts, histograms, scatter plots, graphs, Logical thinking – reasoning, Pattern recognition in data,
data sequences, puzzles, nonograms. Data Encryption – ciphering sentences and Compression.
PRACTICALS:
1. Logical thinking – reasoning and solving different types of puzzles.
2. Pattern recognition – data sequences and patterns, day– to– day examples.
3. Data Encryption: simple data encoding techniques, ciphering, text compression
Decomposition, Algorithmic thinking – creating oral algorithms for everyday tasks – visualizing
algorithms through sequence of steps, pseudocode, flow charts, selection, iteration, functions,
procedures and parameters.
PRACTICALS:
1. Use decomposition to break the problem into smaller problems and algorithmic design to plan
a solution strategy.
2. Explore the use flowcharts for algorithm visualization.
3. Explore writing a variety of algorithms for a variety of computational problems and visualize
using flowcharts using selection, iteration, functions, procedures, etc.
Abstraction and Modeling, Automata and Finite State Machine, Object Description, Objects and
Objects based modeling – Repair, Reuse, Recycle. Scratch / equivalent – Motion, events, control
PRACTICALS:
1. Abstract the essential details of everyday objects. Translate the description of everyday
objects into data types and variables.
2. Reformulate the above to arrive at a better description and a better solution.
3. Use Scratch / equivalent tool to design simple applications by implementing motion, events
and control.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
29
Understanding complexity, sorting algorithms, search algorithms, Debugging, Enhancing the clarity
of a program – documentation, style, idioms, Automation and Simulation, generalizing a solution, AI
and Computational thinking.
PRACTICALS:
1. Design algorithms for searching and sorting and determine the complexity of the algorithm and
how it scales as the number of items to sort increases.
2. Design possible alternate algorithms and determine which algorithms are more efficient, whether
or not all algorithms are calculable given enough time.
3. Generalize a solution to similar problems
TOTAL: 15L + 30P = 45 PERIODS
TEXT BOOKS
REFERENCES
1. David Clark, Computational and Algorithmic Thinking Book 2, AMT Publishing, 2016.
2. Paul Curzon, “Computing Without Computers: A Gentle Introduction to Computer Programming,
Data Structures, and Algorithms”, 2014.
(https://teachinglondoncomputing.files.wordpress.com/2014/02/booklet– cwc– feb2014.pdf)
3. Wang Paul S, From computing to computational thinking, CRC Press, 2016.
4. Peter J. Denning, Matti Tedre, Computational Thinking, MIT Press, 2019.
5. Paolo Ferragina, Fabrizio Luccio, Computational Thinking_ First Algorithms, Then Code,
Springer International Publishing, 2018.
6. Aman Yadav, Ulf Berthelsen, Computational Thinking in Education_ A Pedagogical Perspective,
Routledge, 2021.
7. Zhiwei Xu, Jialin Zhang, Computational Thinking_ A Perspective on Computer Science,
Springer, 2021.
Web Sources
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
30
COURSE OUTCOMES:
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 1 1 1 – 1 1 1 1 3 3 –
CO2 3 3 3 3 1 1 1 – 1 1 1 1 3 3 –
CO3 3 3 3 3 1 1 2 – 1 1 1 1 3 3 –
CO4 3 3 3 3 1 1 3 – 1 1 1 1 3 3 –
CO5 3 3 3 3 1 1 1 – 1 1 – 1 3 3 –
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
31
அலகு II மரபு – பொறற ஓவியங் கள் முதல் நவீன ஓவியங் கள் வறர –
சிற் பக் கறல: 3
நடுகல் முதல் நவீன சிற் பங் கள் வமர – ஐம் மபொன் சிமலகள் – பழங் குடியினர்
மற் றும் அவர்கள் தயொரிக்கும் மகவிமனப் மபொருட்கள் , மபொம் மமகள் – மதர்
மெய் யும் கமல – சுடுமண் சிற் பங் கள் – நொட்டுப்புறத் மதய் வங் கள் –
குமரிமுமனயில் திருவள் ளுவர் சிமல – இமெக் கருவிகள் – மிருதங் கம் , பமற,
வீமண, யொழ் , நொதஸ்வரம் – தமிழர்களின் ெமூக மபொருளொதொர வொழ் வில்
மகொவில் களின் பங் கு.
அலகு V இந் திய கதசிய இயக்கம் மற் றும் இந் திய பை்பொட்டிற் குத்
தமிழர்களின் பங் களிப் பு: 3
இந்திய விடுதமலப்மபொரில் தமிழர்களின் பங் கு – இந்தியொவின் பிறப் பகுதிகளில்
தமிழ் ப் பண்பொட்டின் தொக்கம் – சுயமரியொமத இயக்கம் – இந்திய மருத்துவத்தில் ,
சித்த மருத்துவத்தின் பங் கு – கல் மவட்டுகள் , மகமயழுத்துப் படிகள் – தமிழ் ப்
புத்தகங் களின் அெ்சு வரலொறு.
TOTAL : 15 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
32
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
33
TOTAL : 15 PERIODS
TEXT– CUM– REFERENCE BOOKS
1. தமிழக வரலொறு – மக்களும் பண்பொடும் – மக.மக. பிள் மள (மவளியீடு:
தமிழ் நொடு பொடநூல் மற் றும் கல் வியியல் பணிகள் கழகம் ).
2. கணினித் தமிழ் – முமனவர் இல. சுந்தரம் . (விகடன் பிரசுரம் ).
3. கீழடி – மவமக நதிக்கமரயில் ெங் ககொல நகர நொகரிகம் (மதொல் லியல் துமற
மவளியீடு)
4. மபொருமந – ஆற் றங் கமர நொகரிகம் . (மதொல் லியல் துமற மவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils – The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi – ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
34
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
35
NCC GENERAL 6
NCC 1 Aims, Objectives & Organization of NCC 1
NCC 2 Incentives 2
NCC 3 Duties of NCC Cadet 1
NCC 4 NCC Camps: Types & Conduct 2
PERSONALITY DEVELOPMENT 7
PD 1 Self– Awareness, Empathy, Critical & Creative Thinking, Decision Making and
Problem Solving 2
PD 2 Communication Skills 3
PD 3 Group Discussion: Stress & Emotions 2
LEADERSHIP 5
L 1Leadership Capsule: Traits, Indicators, Motivation, Moral Values, Honour ‘Code 3
L 2 Case Studies: Shivaji, Jhasi Ki Rani 2
TOTAL : 30 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
36
PERSONALITY DEVELOPMENT 7
PD 1 Self– Awareness, Empathy, Critical & Creative Thinking, Decision Making and Problem
Solving 2
PD 2 Communication Skills 3
PD 3 Group Discussion: Stress & Emotions 2
LEADERSHIP 5
L 1 Leadership Capsule: Traits, Indicators, Motivation, Moral Values, Honour Code 3
L2 Case Studies: Shivaji, Jhasi Ki Rani 2
TOTAL : 30 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
37
NCC GENERAL 6
NCC 1 Aims, Objectives & Organization of NCC 1
NCC 2 Incentives 2
NCC 3 Duties of NCC Cadet 1
NCC 4 NCC Camps: Types & Conduct 2
PERSONALITY DEVELOPMENT 7
PD 1 Self– Awareness, Empathy, Critical & Creative Thinking, Decision Making and Problem
Solving 2
PD 2 Communication Skills 3
PD 3 Group Discussion: Stress & Emotions 2
LEADERSHIP 5
L 1 Leadership Capsule: Traits, Indicators, Motivation, Moral Values, Honour Code 3
L2 Case Studies: Shivaji, Jhasi Ki Rani 2
TOTAL : 30 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
38
COURSE OBJECTIVES:
• To read and comprehend different forms of official texts.
• To develop students’ writing skills in professional context.
• To actively listen, read and understand written and oral communication in a professional
context.
• To comprehend and analyse the visual content in authentic context.
• To write professional documents with clarity and precision
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
39
TEACHING METHODOLOGY
Interactive lectures, role plays, group discussions, listening and speaking labs, technology enabled
language teaching, flipped classroom.
EVALUATION PATTERN
Internal Assessment
Written assessments
Assignment
Lab Assessment
Group discussion (Peer assessment)
Listening
External Assessment
End Semester Examination
COURSE OUTCOMES:
By the end of the courses, students will be able to
CO1: To apply appropriate language structure and vocabulary to enhance both spoken and written
communication in formal contexts.
CO2: Comprehend different forms of official documents
CO 3: Write professional documents coherently and cohesively.
CO 4: Interpret verbal and graphic content in authentic context
CO 5: Analyze and evaluate verbal and audio visual materials.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 √ √
CO2 √ √
CO3 √ √
CO4 √ √
CO5 √ √
TEXT BOOKS:
1. “English for Engineers and Technologists” Volume 2 by Orient Blackswan, 2022
2. “English for Science & Technology – II” by Cambridge University Press, 2023.
REFERENCES:
1. “Communicative English for Engineers and Professionals” by Bhatnagar Nitin, Pearson
India, 2010.
2. “Take Off – Technical English for Engineering” by David Morgan, Garnet Education, 2008.
3. “Advanced Communication Skills” by Mathew Richardson, Charlie Creative Lab, 2020.
4. www.uefap.com
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
40
Laboratory based exercises / assignments / assessments will be given to students from the
content of the course wherever applicable.
Branch specific / General Engineering applications based on the content of each units will be
introduced to students wherever possible.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
41
2. Recursive and iterative algorithms for Fibonacci numbers.( Ref. Rosen pg. 316 – 317)
Graphs
1. Checking graph isomorphism using adjacency matrix.
2. Finding the shortest path in a connected weighted graph (Dijkstra's algorithm).
Algebraic Structures
1. Modular exponentiation.
2. Euclidean algorithm. (Ref. Rosen pg. 226 – 227)
Lattices
1. Minimization of the Boolean function of two or three variables using Karnaugh maps.
(Ref. Rosen pg. 712)
COURSE OUTCOMES :
CO 1 :Understand the validity of the logical arguments, mathematical proofs and correctness
of the algorithm.
CO 2 :Apply Combinatorial counting techniques in solving combinatorial related problems.
CO 3 :Use graph models and their connectivity, traversability in solving real world problems
CO 4 :Understand the significance of algebraic structural ideas used in coding theory and
cryptography.
CO 5 :Apply Boolean laws and Boolean functions in combinatorial circuit designs.
TEXT BOOKS:
1. Kenneth H. Rosen, “ Discrete Mathematics and its Applications”, Tata Mc Graw Hill Pub.
Co. Ltd., Seventh Edition, Special Indian Edition, New Delhi, 2011.
2. Tremblay J. P. and Manohar R, “ Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGraw Hill Pub. Co. Ltd., Third Edition, New Delhi, 2013.
REFERENCES:
1. Thomas Koshy,” Discrete Mathematics with Applications”, Elsevier Publications, Boston,
2004.
2. Grimaldi R.P., “Discrete and Combinatorial Mathematics”, Pearson Education Pvt. Ltd., 5th
Edition, Singapore, 2004.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO 1 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 2 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 3 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 4 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 5 : 3 3 2 3 1 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
42
UNIT II NANOCHEMISTRY
Basics– distinction between molecules, nanomaterials and bulk materials; size– dependent
properties (optical, electrical, mechanical, magnetic and catalytic). Types –nanoparticle,
nanocluster, nanorod, nanowire and nanotube. Preparation of nanomaterials: sol– gel, solvothermal,
laser ablation, chemical vapour deposition, electrochemical deposition and electro– spinning.
Characterization – Scanning Electron Microscope and Transmission Electron Microscope –
Principle and instrumentation (block diagram). Applications of nanomaterials – medicine including
AYUSH, automobiles, electronics, and cosmetics.
PRACTICAL:
• Preparation of nanoparticles by Sol– Gel method/sonication method.
• Preparation of nanowire by Electrospinning.
• Study of morphology of nanomaterials by scanning electron microscopy
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
43
PRACTICAL:
• Study of components of Lead acid battery.
• Measurement of voltage in a photovoltaic cell.
• Working of H2 – O2 fuel cell
TOTAL: 75 PERIODS
COURSE OUTCOMES :
CO1: To demonstrate knowledge of water quality in various industries and develop skills in
analyzing water quality parameters for both domestic and industrial purposes.
CO2: To identify and apply fundamental concepts of nanoscience and nanotechnology for
engineering and technology applications, and to develop skills in synthesizing nanomaterials
and studying their morphology.
CO3: To apply fundamental knowledge of corrosion protection techniques and develop skills
to conduct experiments for measuring and preventing corrosion.
CO4: To study the fundamentals of energy storage devices and develop skills in constructing
and experimenting with batteries.
CO5: To recognize and apply basic knowledge of different types of polymeric materials and
develop skills in preparing and determining their applications for futuristic material
fabrication needs.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
44
TEXT BOOKS:
1. Jain P. C. & Monica Jain., “Engineering Chemistry”, 17th Edition, Dhanpat Rai Publishing
Company (P) Ltd, New Delhi, 2015.
2. Sivasankar B., “Engineering Chemistry”, Tata McGraw– Hill Publishing Company Ltd, New
Delhi, 2012.
3. Dara S.S., “A Textbook of Engineering Chemistry”, Chand Publications, 2004.
4. Laboratory Manual – Department of Chemistry, CEGC, Anna University (2023).
REFERENCES:
1. Schdeva M.V., “Basics of Nano Chemistry”, Anmol Publications Pvt Ltd, 2011.
2. Friedrich Emich, “Engineering Chemistry”, Medtech, 2014.
3. Gowariker V.R., Viswanathan N.V. and Jayadev Sreedhar, “Polymer Science” New AGE
International Publishers, 2009.
4. Vogel’s Textbook of Quantitative Chemical Analysis (8th edition, 2014).
CO – PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 – – – – 3 – – – – –
CO2 3 – 2 – 2 – 3 – – – – –
CO3 3 3 2 – 2 – 3 – – – – –
CO4 3 3 – – – – 3 – – – – –
CO5 3 – – – – – 3 – – – – –
Avg 3 3 – – – – 3 – – – – –
1’ = Low; ‘2’ = Medium; ‘3’ = High
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
45
Manual drawing tools (Mini Drafter, Set Squares, Protractor, Compass, and different grades of
pencil). ‘BIS’ specifications and rules of Engineering Drawing – Arrows (2H thin line body, HB
Filled head and L:W = 3:1 ratio), lettering (Digital fonts, font sizes pertaining to usage and
representation), types of line and their syntax (Drawing based – Continuous thin & thick,
dashed, dashed dotted and Application based – extension, dimensioning, construction,
projection, reference, axis, section, hatching, and break lines), scaling (up, down and equal),
and dimensioning. Placing and positioning the ‘A3’ size drawing sh eet over the drawing table.
Principal planes and projection, Division of line and circle in to equal parts, and construction
of polygons
_________________________________________________________________________
Construction of conic curves with their tangent and normal – ellipse, parabola, and hyperbola
by eccentricity method
Construction of special curves with their tangent and normal – cycloid, epicycloid, and involute
Projection of points and I angle projection of lines inclined to both principal planes by rotating
line method and trapezoidal rule – marking their traces.
Lab exercises: Study exercise – Introduction to Sketching (or) Drawing, and modification tools
in CAD software (AutoCAD, CREO, CATIA, Solid Works, Inventor, Fusion 360)
(6+12 = 18 Hours)
Activities based learning: Identification of the curves used in the application given in the
flash card, demonstration of the instantaneous centre of rotation of governors with respect to
angle of inclination of the arms of the governors
Projection of surfaces inclined to both the principal planes – polygonal, trapezoidal, rhomboidal
and circular
Projection of solids – prisms, pyramids, and axisymmetric solids when the axis inclined to both
the principal planes – freely hanging – contour resting condition on either of the planes by
rotating object method
Lab exercises: Construction of basic sketches – lines, circle, polygon, spline curves, coils,
along with dimensioning. Familiarizing with geometric constraints and their types
(6+12 = 18 Hours)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
46
Activities based learning: Making the solids using cardboards, shadow mapping and contour
drawing at different orientation of the solids using torches
Free hand sketching – I & III angle projections of engineering parts and components
Perspective projection of prisms, pyramids and axisymmetric solids by visual ray method
(6+12 = 18 Hours)
Activities based learning: Flipped classroom for Free hand sketching, Jig saw activity for
Isometric projection, arts and crafts for perspective view
Section of simple and hollow solids – prisms, pyramids and axisymmetric solids, solids with
holes/ slots when the section plane perpendicular to one principal plane and inclined to other
principal plane (‘On the axis’ and ‘from the axis’ conditions)
Application based – section of beams (I, T, L, and C), section of pipe bracket, wood joints,
composite walls, shells, flange of a coupling and other similar applications
Lab exercises: Assembly of parts with respect to engineering constraints, and sectioned
drafting of assembled components
(6+12 = 18 Hours)
Activities based learning: Making of mitered joint in wood, sectioning the beams in different
angles of orientation and identifying the true shape
Lateral surface development of sectioned solids when the section plane perpendicular to VP
and inclined to HP.
Application based – construction of funnel, chimney, dish antenna, door latch, trays, AC vents,
lamp shade, commercial packaging boxes with respect to sectioning conditions and other
similar applications
Lab exercises: Sheet metal design and drafting, drafting of coils, springs and screw threads
(6+12 = 18 Hours)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
47
Activities based learning: Fabrication of funnels, chimney, lamp shade, boxes using card
boards, ply woods, acrylics
Total: 90 Hours
Note: Activities based learning should not be covered in the regular class hours. It should be
given as assignments to the group of maximum 3 members
COURSE OBJECTIVES
After successful completion of this course, the students will be able to:
1. Understand and use the engineering curves in engineering applications and projection
techniques to construct conic curves, points and lines.
2. Develop skills in projecting surfaces and solids and create 2D models using CAD software.
3. Develop skills in 3D projection and 3D modeling of simple parts manually as well as using CAD
software.
4. Understand and apply sectioning techniques to solids and assemble components.
5. Develop skills in lateral surface development and sheet metal design.
COURSE OUTCOMES :
After successful completion of the course, the students will be able to:
CO1: Construct and identify different types of conic curves and special curves, and project the points
and lines pertaining to engineering applications
CO2: Project and visualize surfaces and solids in different orientations and utilize the CAD tools for
designing.
CO3: Create and draft accurate 3D models and 2D drawings of machine parts manually as well as
using CAD software
CO4: Determine the true shape of a sectioned solid and draft the assembled parts accordingly
CO5: Develop lateral surfaces of sectioned solids and design sheet metal components
Text book
1. “Engineering Drawing” by N S Parthasarathy and Vela Murali, Oxford University Press; UK ed.
Edition, 2015.
2. “Engineering Drawing + Auto CAD” by Venugopal K, V. Prabhu Raja, New Age International
Publishers, Sixth edition (1 January 2022).
References
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
48
1. "Basic Engineering Drawing: Mechanical Semester Pattern" by Mehta and Gupta, Charotar
Publishing House, 2nd edition, 2018.
2. "Engineering Drawing" by Basant Agrawal and C M Agrawal, Vikas Publishing House, 3rd edition,
2020.
3. "Engineering Drawing With Auto CAD" by B V R Gupta, McGraw Hill Education, 4th edition, 2019.
4. "Engineering Drawing" by P S Gill, Tata McGraw Hill Education, 5th edition, 2018.
5. "Engineering Drawing with an Introduction to AutoCAD" by Dhananjay Jolhe, Cengage Learning,
2nd edition, 2020.
6. "Engineering Drawing" by M B Shah, Charotar Publishing House, 3rd edition, 2019
7. "Fundamentals of Engineering Drawing" by Imtiaz Hashmi, Pearson Education, 2nd edition, 2018.
8. "Computer Aided Engineering Drawing" by S Trymbaka Murthy, Scitech Publications, 3rd edition,
2020.
9. "CAED: Computer Aided Engineering Drawing for I/II Semester BE/Btech Courses" by Reddy K
B, CBS Publishers & Distributors, 2nd, 2019.
10. "Computer– Aided Engineering Drawing" by Subrata Pal, Oxford University Press, 2nd, 2020.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 1 3 1 3 3 3 2
2 3 3 2 2 3 2 3 3 3 2
3 3 3 3 1 2 3 3 3 3 3 2
4 3 3 3 1 3 3 3 3 3 3 2
5 3 3 3 1 3 3 3 3 3 3 2
ME23C04 MAKERSPACE L T P C
1 0 4 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
49
COURSE OBJECTIVES:
1. To practice the usage of various tools towards assembly and dis– assembly of different
items / equipment.
2. To make simple part / component using welding processes.
3. To train on the basic wiring practices of boards, machines, etc.
4. To provide a hands– on experience on the use of electronic components, equipment,
sensors and actuators.
5. To expose to modern computer tools and advanced manufacturing / fabrication processes.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
50
REFERENCES:
1. Stephen Christena, Learn to Weld: Beginning MIG Welding and Metal Fabrication Basics,
Crestline Books, 2014.
2. H. Lipson, Fabricated – The New World of 3D Printing, Wiley, 1st edition, 2013.
3. Code of Practice for Electrical Wiring Installations (IS 732:2019)
4. A.S. Sedra and K.C. Smith, Microelectronic Circuits, Oxford University Press, 7th ed. (Indian
edition), 2017.
5. Mazidi, Naimi, Naimi, AVR Microcontroller and Embedded Systems: Using Assembly and C,
Pearson India, 1st edition 2013.
6. Visualization, Modeling, and Graphics for Engineering Design, D.K. Lieu, S.A. Sorby,
Cengage Learning; 2nd edition.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
51
ெங் க கொலத்தில் வடிவமமப் பு மற் றும் கட்டுமொனங் கள் & ெங் க கொலத்தில் வீட்டுப்
மபொருட்களில் வடிவமமப் பு– ெங் க கொலத்தில் கட்டுமொன மபொருட்களும்
நடுகல் லும் – சிலப் பதிகொரத்தில் மமமட அமமப் பு பற் றிய விவரங் கள் –
மொமல் லபுரெ் சிற் பங் களும் , மகொவில் களும் – மெொழர் கொலத்துப் மபருங் மகொயில் கள்
மற் றும் பிற வழிபொட்டுத் தலங் கள் – நொயக்கர் கொலக் மகொயில் கள் – மொதிரி
கட்டமமப் புகள் பற் றி அறிதல் , மதுமர மீனொட்சி அம் மன் ஆலயம் மற் றும்
திருமமல நொயக்கர் மஹொல் – மெட்டிநொட்டு வீடுகள் – பிரிட்டிஷ் கொலத்தில்
மென்மனயில் இந்மதொ– ெொமரொமெனிக் கட்டிடக் கமல.
கப் பல் கட்டும் கமல – உமலொகவியல் – இரும் புத் மதொழிற் ெொமல – இரும் மப
உருக்குதல் , எஃகு – வரலொற் றுெ் ெொன்றுகளொக மெம் பு மற் றும் தங் க நொணயங் கள் –
நொணயங் கள் அெ்ெடித்தல் – மணி உருவொக்கும் மதொழிற் ெொமலகள் – கல் மணிகள் ,
கண்ணொடி மணிகள் – சுடுமண் மணிகள் – ெங் கு மணிகள் – எலும் புத்துண்டுகள் –
மதொல் லியல் ெொன்றுகள் – சிலப் பதிகொரத்தில் மணிகளின் வமககள் .
அமண, ஏரி, குளங் கள் , மதகு – மெொழர்கொலக் குமுழித் தூம் பின் முக்கியத்துவம் –
கொல் நமட பரொமரிப்பு – கொல் நமடகளுக்கொக வடிவமமக்கப் பட்ட கிணறுகள் –
மவளொண்மம மற் றும் மவளொண்மமெ் ெொர்ந்த மெயல் பொடுகள் – கடல் ெொர் அறிவு –
மீன்வளம் – முத்து மற் றும் முத்துக்குளித்தல் – மபருங் கடல் குறித்த பண்மடய
அறிவு – அறிவுெொர் ெமூகம் .
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
52
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
53
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
54
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
55
Object Oriented Programming Concepts – Procedure vs. Object– oriented programming –Tokens –
User– defined types – ADT– Static, Inline and Friend Functions– Function Overloading – Pointers
– Reference variables.
PRACTICALS:
1. Programs using Data types, Operators and Control Structures
2. Programs using Arrays and Strings.
3. Programs using Functions and Pointers.
4. Programs using User– defined types.
Classes and Objects – Constructors and Destructors – Operator Overloading and Type Conversions
– Function object– Dynamic Memory Management.
PRACTICALS:
1. Programs using Classes and Objects.
PRACTICALS:
1. Programs using Constructors and Destructors
2. Programs using Operator Overloading.
3. Programs using Inheritance, Polymorphism and its types.
Function Template and Class Template – Name spaces – Casting – Exception Handling.
PRACTICALS:
1. Programs using Dynamic memory allocation.
2. Programs using Templates and Exceptions.
C++ Stream classes – Formatted IO – File classes and File operations – Standard Template Library
– Case Study.
PRACTICALS:
1. Programs using Sequential and Random access files.
2. Programs using STL
TOTAL: 60 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
56
TEXT BOOKS
1. HM Deitel and PJ Deitel “C++ How to Program”, Seventh Edition, 2014, Prentice Hall.
2. Herbert Schildt, “The Complete Reference in C++”, Fourth Edition, 2017, Tata McGraw Hill.
REFERENCES
1. Bjarne Stroustrup, “The C++ Programming language”, Fourth edition, 2013, Pearson Education.
2. Stephen Prata, “C++ Primer Plus”, Sixth Edition, 2012, Pearson Education
3. E Balagurusamy, “Object oriented Programming with C++”, Eighth edition, 2020, Tata McGraw
Hill.
4. Professional C++, 5th Edition by Marc Gregoire, 2021
COURSE OUTCOMES :
CO1: Impart the skills needed for Object–Oriented Programming and Console applications
development.
CO2 : Map real– world objects into programming objects.
CO3 : Implement the concept of reusability and data security.
CO4 : Write generic programs and handle exceptions
CO5 : Create and process data in files using file I/O functions
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 2 – – 3 3 3 3 3 3 3
CO2 3 3 3 3 3 3 – – 3 3 3 3 3 3 3
CO3 3 3 3 3 3 3 – – 3 2 3 3 3 3 3
CO4 3 3 3 3 3 3 – – 3 2 3 3 3 3 3
CO5 3 3 3 3 3 3 – – 3 2 3 3 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
57
Branch specific / General Engineering applications based on the content of each units will be
introduced to students wherever possible.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
58
COURSE OUTCOMES :
CO1: Can analyze the performance in terms of probabilities and distributions achieved by the
determined solutions.
CO2: Will be familiar with some of the commonly encountered two dimensional random
variables and be equipped for a possible extension to multivariate analysis.
CO3: Provides an estimate or a range of values for the population parameter from random
samples of population.
CO4: Helps to evaluate the strength of the claim/assumption on a sample data using
hypothesis testing.
CO5: Equips to study the influence of several input variables on the key output variable.
TEXT BOOKS:
1. Irwin Miller and Marylees Miller, “John E. Freund’s Mathematical Statistics with
applications”, Pearson India Education, Asia, 8th Edition, 2014.
2. Walpole, R.E., Myers R.H., Myres S.L., and Ye, K. “Probability and Statistics for Engineers
and Scientists”, Pearson Education, Asia, 9th Edition, 2024.
REFERENCES:
1. Richard A. Johnson, Irwin Miller, John Freund “Miller & Freund’s Probability and Statistics
for Engineers”, Person Education, 8th Edition, 2015.
2. Ross, S.M. “Introduction to Probability and Statistics for Engineers and Scientists”,
Elsevier,
New Delhi, 5th Edition, 2014.
3. Spiegel, M.R., Schiller, J., Srinivasan, R.A. and Goswami, D. “Schaum’s Outline of Theory
and Problems for Probability and Statistics”, McGraw Hill Education, 3rd Edition, Reprint,
2017.
4. Devore, J.L. “Probability and Statistics for Engineering and the Sciences”, Cengage
Learning, 9th Edition, 2016.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
59
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO1 3 3 2 3 1 2 1 1 1 1 1 3
CO2 3 3 2 3 1 2 1 1 1 1 1 3
CO3 3 3 2 3 1 2 1 1 1 1 1 3
CO4 3 3 2 3 1 2 1 1 1 1 1 3
CO5 3 3 2 3 1 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
60
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
61
Rational Doors. Discussion on management tools (e.g., Jama Software, JIRA, IBM Rational
Doors) to document, track, and manage software requirements throughout the project lifecycle.
Suggested activities:
• Students create a Software Requirements Specification (SRS) document for a hypothetical
software project, including functional and non– functional requirements.
• Students work on a capstone project incorporating all aspects of requirements gathering and
analysis.
Suggested Evaluations:
• The SRS document should include all necessary sections, such as introduction, overall
description, specific requirements, appendices, and glossary.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
62
• Use automated code review tools (e.g., SonarQube, CodeClimate) to analyze and improve
the quality of a codebase.
Suggested Evaluations:
Develop a small software which accommodate the learning objectives of the course Projects:
• Criminal Record Management: Develop a system to manage criminal records for jailers,
police officers, and CBI officers.
• Car Pooling: Create a web– based intranet application to facilitate carpooling among
corporate employees within an organization.
• Patient Appointment and Prescription Management System: Develop a system to manage
patient appointments and prescriptions.
• Examination and Result Computation System: Develop a system for managing examinations
and computing result
• Automatic Internal Assessment System: Implement a system for automatic internal
assessments.
• Any other use cases.
TOTAL : 45 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to:
1. Explain and compare various software process models, demonstrating knowledge of their
uses.
2. Competence in planning and managing software projects using estimation and scheduling
methods like COCOMO, CPM, and PERT.
3. Employ design thinking techniques to create innovative, user– focused solutions and
prototypes.
4. Skill in writing clean code, conducting effective code reviews, and applying testing methods
such as black– box and white– box testing.
5. Knowledge of DevOps principles and tools, and ability to implement DevOps practices in
continuous integration and delivery.
REFERENCES:
1. Rajib Mall, Fundamentals of Software Engineering, Fourth Edition, 5th Edition, PHI Learning
2.Roger S. Pressman, Software Engineering – A Practitioner’s Approach”, 7 th Edition McGraw
Hill Publications
3. Sommerville, Software Engineering”, 8th Edition Pearson Education
4. Pankaj Jalote, Software Engineering – A Precise Approach, Wiley India
5. Waman S Jawadekar Software Engineering principles and practice, The McGraw– Hill
Companies
6. Roman Pichler, Agile Product Management with Scrum
7. Ken Schwaber, Agile Project Management with Scrum (Microsoft Professional)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
63
Mapping of CO with PO
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 - - 2 – – – - - – – 1 3 3
CO2 2 3 - - 3 – – – – – – – 1 3 3
CO3 2 2 3 - 2 – – 2 - 1 – – 1 3 3
CO4 2 1 - 3 – – – 1 – 2 – – 1 3 3
CO5 - - 2 3 2 – – 2 – - – – 1 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
64
PRACTICALS:
1. Implementation of Binary Trees, Traversal operations
2. Implementing Heap structure
3. Implementing search algorithms on graph
UNIT – III SORTING 8L, 12P
Insertion Sort – Heap Sort – Merge Sort – Quick Sort – Counting Sort – External Sorting – Multi-
way Merge Sort.
PRACTICALS:
1. Implementation of Sorting Algorithms
PRACTICALS:
1. Implementation of Searching Algorithm
2. Operations on Binary Search Trees
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
65
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
REFERENCES:
1. Ellis Horowitz and Sartaj Sahni, Anderson Freed “Fundamentals of Data Structures in C”,
Universities Press, Second Edition, 2008.
2. Ellis Horowitz, Sartaj Sahni and Dinesh Mehta “Fundamentals of Data Structures in C++”,
Universities Press, 2008.
3. Yashavant Kanetkar, “Data Structures through C”, BPB press, 4th edition, 2022.
4. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, second Edition, Pearson
Education, 1997.
5. Jean– Paul Tremblay and Paul G Sorenson, “An Introduction to Data Structures with
Applications”, Second Edition, Tata McGrawHill, 2017.
6. Thomas H Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, Third Edition, Prentice Hall of India, 2009.
7. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, “Fundamental of Computer
Algorithms”, Second Edition, Universities Press, 2008.
Mapping of CO with PO
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 – – – 3 2 – 3 2 3 2
CO2 3 3 2 2 – – – – – – – – 3 2 2
CO3 3 3 3 3 2 – – – 3 – – 3 3 3 3
CO4 3 1 2 2 – – – – – – – 3 1 3 2
CO5 2 1 2 3 – – – – – 2 – – 1 2 2
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
66
PRACTICALS:
1. Verification of Boolean Theorems using basic gates.
2. Design and implementation of combinational circuits using basic gates and universal gates for
arbitrary functions.
PRACTICALS:
1. Design and implementation of Parity generator / checker.
2. Design and implementation of Magnitude Comparator.
3. Design and implementation of Code converters.
4. Design and implementation of an application using multiplexers.
5. Combinational circuits using HDL.
PRACTICALS:
1. Design and implementation of shift –registers.
2. Design and implementation of synchronous counters.
3. Sequential circuits using HDL.
UNIT – IV ASYNCHRONOUS SEQUENTIAL LOGIC 9L, 12P
Asynchronous Sequential Logic: Analysis and Design of Asynchronous Sequential Circuits –
Reduction of State and Flow Tables – Race– free State Assignment.
PRACTICALS:
1. Design and implementation of asynchronous counters.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
67
PRACTICALS:
1. Design and implementation of a simple digital system.
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
REFERENCES:
1. M.Morris Mano and Michael D.Ciletti, "Digital Design”, VI Edition, Pearson Education, 2018.
2. G. K.Kharate, "Digital Electronics”, First Edition, Oxford University Press, 2010.
3. John F.Wakerly, "Digital Design Principles and Practices”, Fourth Edition, Pearson Education,
2007.
4. Charles H.Roth Jr, "Fundamentals of Logic Design”, Seventh Edition – Jaico Publishing House,
Mumbai, 2013.
5. Donald D.Givone, "Digital Principles and Design”, Tata McGraw Hill, 2003.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 1 1 – – – – 3 1 – 1 3 1 –
CO2 3 3 3 3 1 2 1 1 3 2 2 3 3 3 2
CO3 3 2 2 3 1 1 1 1 3 1 1 2 2 1 2
CO4 3 2 2 3 1 1 1 1 3 1 1 3 2 3 2
CO5 3 3 3 3 3 2 1 1 3 2 2 1 1 1 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
68
PRACTICALS:
1. Develop programs using Java basic constructs and arrays using any standard IDE like
NETBEANS / ECLIPSE
2. Develop programs to illustrate concept of class and static classes and methods
3. Develop programs using String class, Date and Time API
PRACTICALS:
1. Develop programs using Streams API and File I/O for reading and writing the contents in
sequential and random order.
2. Develop programs using Generics classes and methods
3. Develop applications with Database Connectivity
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
69
PRACTICALS:
1. Develop Event-driven programs for GUI applications
2. Develop servlet based applications
3. Design a Java Web application using Spring Boot
TOTAL: 45L + 60P = 105 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
1. Construct programs using Object Oriented Design principles like encapsulation, abstraction,
polymorphism, inheritance and types.
2. Develop applications with handlers for user– defined exceptions, according to the given
requirements.
3. Construct efficient multithreaded programs with synchronization constructs.
4. Develop interactive GUI applications with event handling that provide rich user experience.
5. Construct programs using the suitable Collection classes and interfaces for efficient modelling
of the objects and entities of the program and develop Web Applications that use file input and
output using any framework.
REFERENCES:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
70
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 2 1 3 1 – 2 1 2 3 3 3 2
CO2 3 2 3 2 2 3 1 – 2 1 2 2 3 1 3
CO3 3 1 3 2 2 3 1 – 2 1 2 3 3 1 1
CO4 3 1 3 3 2 3 1 – 2 1 2 3 3 3 3
CO5 3 1 3 3 1 3 1 – 3 1 2 3 3 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
71
1 0 0 1
ITU– T Standards in Telecommunications– Overview of ITU– T series (e.g., ITU– T X.509 for
public key infrastructure)– Impact on global telecommunications standards– IETF Standards in
Internet Protocols– Overview of key IETF standards (e.g., RFC 791 for IPv4)– Evolution and
adoption of internet protocols– W3C Standards for the World Wide Web – Key W3C standards
(e.g., HTML5, CSS3, Web Accessibility Guidelines)– Role of standards in web development and
interoperability
Total : 15 PERIODS
REFERENCES:
1. Manual for Standards Formulation 2022, Bureau of Indian Standards
2. Kunas, Michael, “Implementing service quality based on ISO/IEC 20000: A management
guide” IT Governance publishing, 2012.
3. Kan, S. H. “Standards for Information Technology and Systems”, Prentice Hall, 2017.
4. IEEE Computer Society. (2014) “IEEE Guide to the Software Engineering Body of
Knowledge (SWEBOK)”, Version 3.0. IEEE. Retrieved from IEEE Xplore
5. Calder, Alan. “ISO/IEC 27001:2013 – A Pocket Guide” IT Governance Publishing, 2013.
6. Sikos, Leslie,” Web Standards: Mastering HTML5, CSS3, and XML.” Apress, 2011.
7. Association for Computing Machinery. “ACM Code of Ethics and Professional Conduct: A
Guide” ACM, 2018
8. Calder, Alan, “NIST Cybersecurity Framework: A Pocket Guide. IT Governance Publishing”
2018.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
72
COURSE OBJECTIVES:
The objective of the course is four– fold:
1. Development of a holistic perspective based on self– exploration about themselves
(human being), family, society and nature/existence.
2. Understanding (or developing clarity) of the harmony in the human being, family, society
and nature/existence
3. Strengthening of self– reflection.
4. Development of commitment and courage to act.
MODULE I: INTRODUCTION (3L,6P)
Purpose and motivation for the course, recapitulation from Universal Human Values– I, Self–
Exploration– Its content and process; ‘Natural acceptance’ and Experiential Validation– as the
process for self– exploration Continuous Happiness and Prosperity– A look at basic Human
Aspirations Right understanding, Relationship and Physical Facility– the basic requirements for
fulfilment of aspirations of every human being with their correct priority Understanding Happiness
and Prosperity correctly– A critical appraisal of the current scenario, Method to fulfil the above
human aspirations: understanding and living in harmony at various levels.
Practical Session: Include sessions to discuss natural acceptance in human being as the innate
acceptance for living with responsibility (living in relationship, harmony and co– existence) rather
than as arbitrariness in choice based on liking– disliking
MODULE II: HARMONY IN THE HUMAN BEING (3L,6P)
Understanding human being as a co– existence of the sentient ‘I’ and the material ‘Body’,
Understanding the needs of Self (‘I’) and ‘Body’ – happiness and physical facility, Understanding
the Body as an instrument of ‘I’ (I being the doer, seer and enjoyer), Understanding the
characteristics and activities of ‘I’ and harmony in ‘I’, Understanding the harmony of I with the Body:
Sanyam and Health; correct appraisal of Physical needs, meaning of Prosperity in detail,
Programs to ensure Sanyam and Health.
Practical Session: Include sessions to discuss the role others have played in making material
goods available to me. Identifying from one’s own life. Differentiate between prosperity and
accumulation. Discuss program for ensuring health vs dealing with disease.
MODULE III: HARMONY IN THE FAMILY AND SOCIETY (3L,6P)
Understanding values in human– human relationship; meaning of Justice (nine universal values
in relationships) and program for its fulfilment to ensure mutual happiness; Trust and Respect as
the foundational values of relationship, Understanding the meaning of Trust; Difference between
intention and competence, Understanding the meaning of Respect, Difference between respect
and differentiation; the other salient values in relationship, Understanding the harmony in the
society (society being an extension of family): Resolution, Prosperity, fearlessness (trust) and
co– existence as comprehensive Human Goals, Visualizing a universal harmonious order in
society– Undivided Society, Universal Order– from family to world family.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
73
Practical Session: Include sessions to reflect on relationships in family, hostel and institute as
extended family, real life examples, teacher– student relationship, goal of education etc.
Gratitude as a universal value in relationships. Discuss with scenarios. Elicit examples from
students’ lives
COURSE OUTCOMES:
By the end of the course, the students will be able to:
1. Become more aware of themselves, and their surroundings (family, society, nature);
2. Have more responsible in life, and in handling problems with sustainable solutions, while
keeping human relationships and human nature in mind.
3. Have better critical ability.
4. Become sensitive to their commitment towards what they have understood (human values,
human relationship and human society).
5. Apply what they have learnt to their own self in different day– to– day settings in real life, at
least a beginning would be made in this direction.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
74
REFERENCES:
1. Human Values and Professional Ethics by R R Gaur, R Sangal, G P Bagaria, Excel Books,
New Delhi, 3rd revised edition, 2023.
2. Jeevan Vidya: Ek Parichaya, A Nagaraj, Jeevan Vidya Prakashan, Amarkantak, 1999.
3. Human Values, A.N. Tripathi, New Age Intl. Publishers, New Delhi, 2004.
4. The Story of Stuff (Book).
5. The Story of My Experiments with Truth – by Mohandas Karamchand Gandhi
6. Small is Beautiful – E. F Schumacher.
7. Slow is Beautiful – Cecile Andrews.
8. Economy of Permanence – J C Kumarappa
9. Bharat Mein Angreji Raj – PanditSunderlal
10. Rediscovering India – by Dharampal
11. Hind Swaraj or Indian Home Rule – by Mohandas K. Gandhi
12. India Wins Freedom – Maulana Abdul Kalam Azad
13. Vivekananda – Romain Rolland (English)
14. Gandhi – Romain Rolland (English)
Web URLs:
1. Class preparations: https://fdp– si.aicte– india.org/UHV– II%20Class%20Note.php
2. Lecture presentations: https://fdp– si.aicte– india.org/UHV– II_Lectures_PPTs.php
3. Practice and Tutorial Sessions: https://fdp– si.aicte– india.org/UHV–
II%20Practice%20Sessions.php
Articulation Matrix:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 1 1 1 3 3
CO2 1 1 1 3 3
CO3 3 3 2 3 1 3
CO4 3 3 2 3 1 3
CO5 3 3 3 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
75
Branch specific / General Engineering applications based on the content of each units will be
introduced to students wherever possible.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
76
COURSE OUTCOME :
CO1: Solve system of linear equations using matrix operations and vector spaces using
Algebraic methods.
CO2: Understand the linear maps between vector spaces and its utilities.
CO3: Apply the concept of inner product of spaces in solving problems.
CO4: Understand the common numerical methods and how they are used to obtain
approximate solutions
CO5: Analyse and evaluate the accuracy of common numerical methods.
TEXT BOOKS:
1. Faires, J.D. and Burden, R., “Numerical Methods”, Brooks/Cole (Thomson Publications),
Fourth Edition, New Delhi, 2012.
2. Friedberg, S.H., Insel, A.J. and Spence, E., “Linear Algebra”, Pearson Education, Fifth
Edition, New Delhi, 2018.
3. Williams, G, “Linear Algebra with Applications”, Jones & Bartlett Learning, First Indian
Edition, New Delhi, 2019.
REFERENCES:
1. Bernard Kolman, David R. Hill, “Introductory Linear Algebra”, Pearson Education, First
Reprint, New Delhi, 2010.
2. Gerald, C.F, and Wheatley, P.O., “Applied Numerical Analysis”, Pearson Education,
Seventh Edition, New Delhi, 2004.
3. Kumaresan, S., “Linear Algebra – A geometric approach”, Prentice – Hall of India, Reprint,
New Delhi, 2010.
4. Richard Branson, "Matrix Operations”, Schaum's outline series, Mc Graw Hill, New York,
1989.
5. Strang, G., “Linear Algebra and its applications”, Cengage Learning, New Delhi, 2005.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO 1 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 2 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 3 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 4 : 3 3 2 3 1 2 1 1 1 1 1 3
CO 5 : 3 3 2 3 1 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
77
PRACTICALS:
1. ER Diagram
DML commands:
3. Data Insertion, updation, and deletion with tables
4. Data retrieval using
● Simple SQL
● Nested Queries
5. Different types of Joins
6. PL/SQL: Functions, Procedures and Triggers
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
78
1. Model an application’s data requirements using conceptual modeling tools like ER diagrams
and design database schemas based on the conceptual model
2. Formulate solutions to a broad range of query problems using relational algebra/ SQL
3. Apply normalization theory to normalize the relations in RDBMS to avoid redundancy and
anomalies.
4. Manage concurrent transactions and their consequences, and analyze the use of triggers,
functions, and procedures in a realistic database application.
5. Understand database storage structures and access techniques
REFERENCES:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, "Database System Concepts", Seventh
Edition, Tata McGraw Hill, 2019.
2. Ramez Elmasri, Shamkant B. Navathe, "Fundamentals of Database Systems", Seventh Edition,
Pearson/Addison – Wesley, 2016.
3. C.J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database Systems”, Pearson
Education, Eighth Edition, 2006.
4. Raghu Ramakrishnan and Johannes Gehrke, “Database Management Systems”, Third
Edition, McGraw Hill, 2014.
5. Andreas Meier, Michael Kaufmann, “SQL & NoSQL Databases: Models, Languages,
Consistency Options and Architectures for Big Data Management”, 1st Edition 2019.
6. Narain Gehani and Melliyal Annamalai, “The Database Book: Principles and Practice Using
the Oracle Database System”, Universities Press, 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 3 1 – 2 – 1 3 3 3 2
CO2 3 3 3 3 3 3 1 – 2 – 1 2 3 3 2
CO3 3 3 3 3 2 3 – – 3 – 1 3 3 3 2
CO4 3 3 3 3 3 3 – – 1 – 1 2 3 3 2
CO5 3 3 3 2 3 3 – – 2 – 1 3 3 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
79
PRACTICALS:
1. Analysing the datapath on the standard simulator.
2. Study of the pipelined implementation and analysis of various hazards on the standard
simulator
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
80
PRACTICALS:
1. Implement a simple functional model of a set– associative cache in C/C++. Study hit/miss
rates for various access patterns. Experiment with different replacement policies.
2. Writing simple programs to study the behaviour of the memory hierarchy.
3. Analyzing the performance of the memory hierarchy by varying different parameters.
1. Evaluate the performance of computer systems and write simple MIPS assembly language
programs
2. Design a simple instruction execution unit
3. Point out the hazards present in a pipeline and suggest remedies
4. Show how ILP is exploited while executing a sequence of instructions
5. Discuss the working of an architectural simulator and modify some features of it
6. Critically analyse the various characteristics of the hierarchical memory and I/O devices
and their interface to the processor
REFERENCES:
1. David A. Patterson and John L. Hennessy, “Computer Organization and Design: The
Hardware/Software Interface”, Sixth Edition, Morgan Kaufmann / Elsevier, 2020.
2. Carl Hamacher, Zvonko Vranesic, Safwat Zaky and Naraig Manjikian, “Computer
Organization and Embedded Systems”, Sixth Edition, Tata McGraw Hill, 2012.
3. John L. Hennessey and David A. Patterson, “Computer Architecture – A Quantitative
Approach”, Morgan Kaufmann / Elsevier, 6th edition, 2019.
4. William Stallings, “Computer Organization and Architecture – Designing for Performance”,
Tenth Edition, Pearson Education, 2016.
5. John P. Hayes, “Computer Architecture and Organization”, Third Edition, Tata McGraw Hill,
2017.
6. V.P. Heuring, H.F. Jordan, “Computer Systems Design and Architecture”, Second Edition,
Pearson Education, 2004.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
81
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 1 1 1 – – – – 2 3 3 3
CO2 3 3 3 2 1 1 1 – 1 – – 2 3 3 3
CO3 3 3 3 2 1 1 1 – – – – 2 3 3 3
CO4 3 3 3 2 1 1 1 – 1 – – 2 3 3 3
CO5 3 3 3 2 1 1 1 – 1 – – 2 3 3 3
CO6 3 3 3 2 1 1 1 – – – 2 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
82
PRACTICALS:
1. Install required software and frameworks: node.js, Express, Angular, react.js, mongodb
2. Experiment with JavaScript – functions, arrays, strings, objects, files
PRACTICALS:
1. Install Express with Node.js, exploring modules
2. Implementing events, listeners, callbacks, data I/O, HTTP servers and Clients
UNIT – III FRONT-END DEVELOPMENT 6L, 12P
Angular – CLI – Typescript - Using Request and Response objects - modules, components,
templates, metadata, data binding, directives, services, dependency injection. React - Virtual DOM,
components, props, JSX, Events, conditionals, lists, forms, Routing, Hooks.
PRACTICALS:
1. Using Angular modules, directives, components, templates, data binding, controllers
2. REACT – components, JSX, props, Rendering, forms
PRACTICALS:
1. NoSQL with MongoDB – setting up a document DB, connecting to MongoDB, CRUD
operations
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
83
PRACTICALS:
1. Developing single Page Applications, RESTful APIs, Web Services, Microservices
REFERENCES:
1. Brad Dayley, Brendan Dayley, Caleb Dayley, ‘Node.js, MongoDB and Angular Web
Development’, Addison-Wesley, Second Edition, 2018.
2. Vasan Subramanian, ‘Pro MERN Stack, Full Stack Web App Development with Mongo,
Express, React, and Node’, Second Edition, Apress, 2019.
3. David Herron, Node.js Web Development, Packt Publishing Limited, 5th edition, 2020.
4. David Flanagan, Javascript The Definitive Guide, Oreilly, 7th Edition, 2020.
5. Nate Murray, Felipe Coury, Ari Lerner, Carlos Taborda, ng-book: The Complete Book on
Angular, Fullstack.io, 2020.
6. Greg Lim, Beginning MEAN Stack (MongoDB, Express, Angular, Node.js), Independently
Published, 1st Edition, 2021.
7. Greg Lim, Beginning Node.js, Express & MongoDB Development, Independently Published,
2020.
8. https://nodejs.org/en
9. https://expressjs.com/
10. https://angular.io
11. https://react.dev
12. https://www.mongodb.com/
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 – – – – – – – 3 3 3
CO2 3 3 3 3 3 – – – – – – – 3 3 3
CO3 3 3 3 3 3 – – – – – – – 3 3 3
CO4 3 3 3 3 3 – – – – – – – 3 3 3
CO5 3 3 3 3 3 – – – – – – – 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
84
UNIT – I FUNDAMENTALS 6L
Introduction – Asymptotic Notations – Recurrences – Substitution Method – Recurrence Tree
Method – Master Method – Probabilistic Analysis and Randomized Algorithms – Best, Worst and
Average Case Analysis of Linear Search, Binary Search and Insertion Sort.
UNIT – V NP PROBLEMS 8L
NP– Completeness – Polynomial Time Verification – Theory of Reducibility – Circuit Satisfiability –
NP – Completeness Proofs – NP Complete Problems: Vertex Cover, Hamiltonian Cycle and
Traveling Salesman Problems – Approximation Algorithms – Approximation Algorithms to Vertex –
Cover and Traveling Salesman Problems.
TOTAL = 45 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
1. Have a strong foundation for algorithm study.
2. Analyze the asymptotic performance of algorithms.
3. Apply important algorithmic design paradigms and methods of analysis.
4. Demonstrate familiarity with string matching algorithms.
5. Prove the hardness and to find alternatives for such problems.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
85
REFERENCES:
1. Thomas H Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, Third Edition, Prentice Hall of India, 2009.
2. Ellis Horowitz, Sartaj Sahni and Senguthevar Rajasekaran, Fundamentals of Computer
Algorithms, Second Edition, Universities Press, 2008.
3. Gilles Brassard and Paul Bratley, Fundamentals of Algorithmics, Eastern Economy Edition,
1996.
4. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, fourth edition, Pearson,
2014.
5. Dasgupta S, Papadimitriou H C and Vazirani U V , Algorithms, 2006.
6. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition, Pearson,
Education India, 2017.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 – 3 – – – – – – 3 3 3 3
CO2 3 3 3 3 3 – – – – – – 3 3 3 3
CO3 3 3 3 3 3 1 – – – – – 3 3 3 3
CO4 3 3 3 3 3 1 – – – – – 3 3 3 3
CO5 3 3 2 3 3 1 – – – – – 3 3 3 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
86
PRACTICALS:
1. Basic UNIX commands.
2. Shell programming.
3. Grep, sed and awk.
4. Learn to write a makefile and to use gdb
PRACTICALS:
1. File system related system calls. (Learn to create, open, read, write, seek into, close files; open,
read, write, search, close directories).
2. Process management – Fork, Exec (Learn to create a new process and to overlay an
executable binary image on an existing process).
3. Inter– process communication using pipes, Message Queues and shared memory
PRACTICALS:
1. CPU scheduling algorithms.
2. Synchronization problems using semaphores
PRACTICALS:
1. Introduction to xv6: download and build. Run the kernel inside QEMU gdb.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
87
2. Read the file xv6/fs.h to understand how a directory entry, a superblock and the contents of
an inode are implemented in xv6.
3. Read the file xv6/fs.c to understand how a new entry is added to a directory and explain the
functions involved.
1. Articulate the main concepts, key ideas, strengths and limitations of Operating Systems and
apply the basic commands and shell scripts to study the primary utilities of the UNIX OS.
2. To analyze the mechanisms of operating systems to handle processes and threads and their
communication; employ file, process and IPC related system calls in handling processes
3. Elaborate, design and experiment various scheduling algorithms; synchronization handling
mechanisms using semaphores; deadlock handling mechanisms
4. Discuss various memory management schemes and design them
5. Point out and analyze the various aspects of storage management
6. Build / Rebuild functionalities of UNIX OS using XV6.
REFERENCES:
1. Abraham Silberschatz, Greg Gagne and Peter B. Galvin. "Operating System Concepts", 10th
Edition, John Wiley & Sons Inc., 2018.
2. Andrew S. Tanenbaum, Herbert Bos. ''Modern Operating Systems'', Pearson, Fifth Edition,
2023.
3. D. M. Dhamdhere. ''Operating Systems: A Concept– Based Approach'', 3rd. Edition, Tata
McGrawHill, 2017.
4. William Stallings. ''Operating Systems: Internals and Design Principles'', Ninth Edition,
Pearson, 2017.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
88
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 2 2 3 2 1 2 – 2 3 2 3 3
CO2 3 3 3 2 2 3 1 1 2 – 2 3 3 3 3
CO3 3 3 3 2 2 3 1 1 2 – 2 3 3 3 3
CO4 3 3 3 2 1 3 1 1 2 – 2 3 3 3 3
CO5 3 3 3 2 1 3 1 1 2 – 2 3 3 3 3
CO6 3 3 3 3 3 3 1 1 2 2 2 3 3 3 3
1– low,2– medium,3– high,'– '– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
89
PRACTICALS:
1. Applications using TCP sockets:
Echo client and echo server
a)
Chat
b)
PRACTICALS:
1. Write socket programs to simulate the operation of the following application layer protocols:
a) HTTP and Web caching
b) DNS
PRACTICALS:
1. Analyze the Network traffic using Packet Analyser (Wireshark) and understand the various
protocol headers.
2. Simulation of flow control
2. Practice different network commands available in Windows and Linux Operating Systems and
troubleshoot the network.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
90
PRACTICALS:
1. Configure the network devices such as Router, Switch, Hub, Bridge, and Repeater by
simulation.
2. Simulation of Distance Vector/ Link State Routing algorithm
PRACTICALS:
1. Performance evaluation of routing protocols using the simulation tool
2. Configuring client– server interaction using mininet with an SDN controller
TOTAL: 45L + 60P = 105 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 1 1 1 – – – – – 3 2 2
CO2 3 3 3 3 2 1 1 – 3 – – 2 3 3 2
CO3 3 3 3 3 2 1 1 – 3 – – 2 3 3 3
CO4 3 3 3 2 1 1 1 – 1 – – 1 3 1 1
CO5 3 3 3 2 2 1 1 – – – – 2 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
91
UNIT – V UNDECIDABILITY 8L
A Language that is not Recursively Enumerable – An Undecidable Problem that is Recursively
Enumerable – Undecidable Problems about Turing Machine – Post‘s Correspondence Problem –
Other Undecidable Problems.
TOTAL: 45 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
1. Classify languages according to Chomsky hierarchy.
2. Design finite automata and prove its equivalence with other forms.
3. Design push down automata and prove its equivalence with context– free grammar
4. Design Turing Machine and prove the equivalence of different extensions of Turing
Machine
5. Prove the undecidability of Recursively Enumerable Languages
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
92
REFERENCES:
1. John E Hopcroft, Rajeev Motwani, and Jeffery D Ullman, "Introduction to Automata Theory,
Languages and Computations”, Pearson Education, 3rd Edition, 2009.
2. John E Hopcroft and Jeffery D Ullman, "Introduction to Automata Theory, Languages and
Computations”, Narosa Publishing House, 2002.
3. H.R. Lewis and C.H. Papadimitriou, "Elements of the theory of Computation”, Second
Edition, Pearson Education, 2003.
4. J. Martin, "Introduction to Languages and the Theory of Computation”, Third Edition, Tata
McGraw Hill, 2003.
5. Micheal Sipser, "Introduction of the Theory and Computation", Thomson Brokecole, 1997.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 2 1 1 1 – – – – – 1 0 3 1
CO2 2 3 3 3 3 2 – – – – – 1 0 3 1
CO3 2 3 3 3 3 2 – – – – – 1 0 3 1
CO4 2 3 3 3 3 2 – – – – – 1 0 3 1
CO5 3 3 3 3 2 2 – – – – – 1 2 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
93
Activity Session: Develop a business model canvas for the prototype; present and receive
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
94
feedback from peers and mentors – Prepare and practice pitching the business ideas– Participate
in a Pitching Competition and present to a panel of judges – receive & reflect feedback
MODULE – V: ENTREPRENEURIAL ECOSYSTEM 4L,8P
Understanding the Entrepreneurial Ecosystem – Components: Angels, Venture Capitalists, Maker
Spaces, Incubators, Accelerators, Investors. Financing models – equity, debt, crowdfunding, etc,
Support from the government and corporates. Navigating Ecosystem Support: Searching &
Identifying the Right Ecosystem Partner – Leveraging the Ecosystem – Building the right
stakeholder network
Activity Session: Arrangement of Guest Speaker Sessions by successful entrepreneurs and
entrepreneurial ecosystem leaders (incubation managers; angels; etc), Visit one or two
entrepreneurial ecosystem players (Travel and visit a research park or incubator or makerspace
or interact with startup founders).
TOTAL: 60 PERIODS
COURSE OUTCOMES :
Upon the successful completion of the course, students will be able to:
CO1: Develop an Entrepreneurial Mind– set and Understand the Entrepreneurial Ecosystem
Components and Funding types
CO2: Comprehend the process of opportunity identification through design thinking, identify
market potential and customers
CO3: Generate and develop creative ideas through ideation techniques
CO4: Create prototypes to materialize design concepts and conduct testing to gather
feedback and refine prototypes to build a validated MVP
CO5: Analyse and refine business models to ensure sustainability and profitability Prepare and
deliver an investible pitch deck of their practice venture to attract stakeholders
REFERENCES:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
95
PRACTICALS:
1. Implementing a classical cipher and breaking it through cryptanalysis
PRACTICALS:
1. Implementing block ciphers using openssl in C/C++.
PRACTICALS:
1. Computing MACs, Hashes and HMACs for messages
PRACTICALS:
1. Finding passwords in executables using GDB
2. Implementing simple buffer overflows
3. Implementing simple format string attacks
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
96
PRACTICALS:
1. Implementing Return Oriented Programming
2. Implement SQL injection in PHP based websites
3. Using libfuzzer and AFL to fuzz your own C/C++ implementations
4. Using arpspoof to poison network and detect using Wireshark
TOTAL: 45L + 30P = 75 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
1. Illustrate the basic concepts of encryption and decryption for secure data transmission.
2. Develop solutions for security problems
3. Analyze various cryptography techniques and their applications
4. Discuss various memory– based attacks and their characteristics.
5. Demonstrate various exploitations present in security
REFERENCES:
1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Eighth
Edition, Pearson Education, 2020.
2. Jon Erickson, “Hacking: The Art of Exploitation”, 2nd Edition, Starch Press, 2008.
3. N. Ferguson, B. Schneier, and T. Kohno. “Cryptography Engineering: Design Principles and
Practical Applications”. Wiley, 2010.
4. Neil Daswani, Christoph Kern, and Anita Kesavan, “Foundations of Security: What Every
Programmer Needs to Know”, Frist Edition, Apress, 2007.
5. “The Shellcoder's Handbook: Discovering and Exploiting Security Holes”, 2nd Edition by
Chris Anley et al, 2007
6. www.shodan.io
7. https://github.com/robertdavidgraham/masscan
8. https://zmap.io/
9. https://cs.dartmouth.edu/~sergey/cs60/wireshark– exercises.txt
10. https://cs.dartmouth.edu/~sergey/cs60/arp/arp– poisoning.txt
11. https://owasp.org/
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 1 1 2 2 – 1 – – 2 3 1 1
CO2 3 3 3 1 2 3 2 1 1 – – 2 3 3 3
CO3 3 3 3 1 2 3 2 1 1 – – 2 3 3 3
CO4 3 3 2 2 2 3 2 1 1 – – 2 2 3 2
CO5 3 3 2 1 1 2 2 1 1 – – 2 2 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
97
PRACTICALS:
1. Programs using LEX for tokenization.
2. Implementation of error recovery procedures using LEX.
3. Programs using YACC for parsing.
4. Programs for validating C– like constructs using YACC.
Type Checking
UNIT – II TYPE CHECKING AND RUNTIME ENVIRONMENTS 8L, 4P
Syntax Directed Definitions –Construction of Syntax Tress –Type Systems – Specification of a
Simple Type Checker– Equivalence of Type Expressions –Type Conversations– Attribute Grammar
for a Simple Type checking system–Runtime Environments: Storage Organization – Stack
Allocation of space – Access to Nonlocal Data on the Stack – Storage allocation Strategies–
Parameter Passing – Symbol Table.
PRACTICALS:
1. Implementation of Symbol Table for a programming language like C.
2. Simple Type Checking System for basic data types in a programming languages like C.
PRACTICALS:
1. Implementation of three– address code generation for arithmetic expressions.
2. Three– address code generation for Switch– case statements.
3. Three– address code generation for arrays and Boolean expressions.
UNIT – IV CODE GENERATION 9L,4P
Issues in the Design of a Code generator – Target Language – Address of the target code – Simple
Code Generator – Register Allocation and Assignment – Code Generation – Instruction Selection
by Tree Rewriting – Optimal Code Generation for Expressions – Dynamic Programming Code
Generation.
PRACTICALS:
1. Generation of Simple target code from the three-address code.
2. Iimplementation of Register allocation using Graph Colouring.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
98
Basic Blocks and Flow Graphs – Optimization of Basic Blocks – Peephole Optimization – Principal
Sources of Optimization – Introduction to Data Flow Analysis – Partial Redundancy Elimination –
Loops in Flow Graphs.
PRACTICALS:
1. Implementation of peephole optimization to the generated code.
2. Integrating all the implemented features for a programming language like C.
TOTAL = 75 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
1. Comprehensively explain the analysis phases of compiler and develop scanners and parsers.
2. Manage type checking for a given language specification
3. Generate the intermediate representation of programs
4. Produce the target machine code using the runtime environment
5. Transform given code into an optimized code by applying various optimization techniques
REFERENCES:
1. Alfred Aho, Monica S Lam, Ravi Sethi, Jeffrey D Ullman, “Compilers Principles, Techniques
and Tools”, Pearson Education, Asia 2014.
2. Andrew W Appel, Modern Compiler Implementation in ML, Cambridge University Press,
December 1997.
3. Kenneth C. Louden, Compiler Construction: Principles and Practice, Cengage Learning, 1st
Edition, 1997.
4. Steven. S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufman
Publishers, First Edition, 1997.
5. Randy Allen and Ken Kennedy, Optimizing Compilers for Modern Architectures: A
Dependence based Approach, Morgan Kaufman, First Edition, 2001.
6. Y. N. Srikant, Priti Shankar, The Compiler Design Handbook – Optimizations and Machine
Code Generation, CRC Press, Second Edition, 2007.
7. John E Hopcroft and Jeffery D Ullman, "Introduction to Automata Theory, Languages and
Computations”, Narosa Publishing House, 2002.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 2 2 3 1 1 – – – – 1 3 2 1
CO2 1 2 2 2 3 1 1 – – – 1 1 3 2 1
CO3 1 2 2 2 3 1 1 – – – 1 1 3 2 1
CO4 1 2 2 2 3 1 1 – 1 – 1 1 3 2 1
CO5 3 3 2 3 3 1 1 – 1 – 1 1 3 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
99
PRACTICALS:
Linear Models for Regression – Linear Models for Classification– Discriminant functions,
Probabilistic Generative Models, Probabilistic Discriminative Models – Neural Networks–
McCulloch– Pitts Neuron Model– Perceptron– Single– Layer & Multi– layer Perceptron, Back–
propagation– Gradient Descent – Decision Tree – Support Vector Machines– – Naïve Bayes
Classification – Ensemble Learning.
PRACTICALS:
1. Construct Models with supervised learning algorithms using Tools and Python Libraries.
PRACTICALS:
1. Construct Models with unsupervised learning algorithms using Tools and Python Libraries.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
100
PRACTICALS:
Interpretable and Explainable Machine Learning- Introduction to Deep Learning Networks- CNN,
Graph Neural Networks RNN, GAN and Transformers.
PRACTICALS:
REFERENCES:
1. Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, Second Edition,
Chapman and Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
2. Tom M Mitchell, “Machine Learning”, McGraw Hill Education, 2013
3. Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007
4. Ian Goodfellow, YoshuaBengio, AaronCourville, “Deep Learning”, MIT Press, 2016
5. Guido, Sarah, and Müller, Andreas C.. Introduction to Machine Learning with Python: A Guide
for Data Scientists. United States, O'Reilly Media, 2016.
6. T V Geetha, S Sendhilkumar, Understanding Machine Learning, Chapman and Hall/CRC
7. S Sridhar, M Vijayalakshmi, Machine Learning, Oxford University Press
8. Yao Ma,Jilang Tang ,Deep Learning on Graphs ,Cambridge University Press ,2021
9. Christoph Molnar ,Interpretable Machine Learning,2020.
10. Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, Adaptive Computation and
Machine Learning Series, MIT Press, 2014.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
101
11. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
First Edition, Cambridge University Press, 2012.
12. Jason Bell, “Machine learning – Hands on for Developers and Technical Professionals”, First
Edition, Wiley, 2014.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 1 2 1 – – – 2 3 3 3 3
CO2 3 3 3 3 3 2 1 – 2 – 2 2 3 3 3
CO3 3 3 3 3 3 2 1 – 2 – 2 2 3 3 3
CO4 3 3 3 3 3 2 1 – 2 – 2 2 3 3 3
CO5 3 3 3 3 3 2 1 – 2 – 3 2 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
102
MODULE I – INTRODUCTION 6
Principles & Historical perspectives, Importance and need for sustainability in engineering and
technology, impact and implications. United Nations Sustainability Development Goals (SDG), UN
summit – Rio & outcome, Sustainability and development indicators.
Climate change, Biodiversity loss, Pollution and waste management, Renewable vs. non– renewable
resources, Water and energy conservation, Sustainable agriculture and forestry. National and
international policies, Environmental regulations and compliance, Ecological Footprint Analysis
Equity and justice, Community development, Smart cities and sustainable infrastructure, Cultural
heritage and sustainability, Ethical considerations in sustainable development.
Triple bottom line approach, Sustainable economic growth, Corporate social responsibility (CSR),
Green marketing and sustainable product design, Circular economy and waste minimization, Green
accounting and sustainability reporting.
MODULE IV – SUSTAINABILITY 9
Sustainable Software: What, Why and How – Social and Individual Sustainability in SE – Choosing
energy– efficient programming languages. Types and sources of e– waste – Environmental and
health impacts of e– waste – E– waste regulations and policies – Techniques for recycling IT
equipment – Safe disposal methods – E– waste stream management – Concepts of circular
economy – Role of IT in promoting circular economy.
• Energy efficiency – how to save energy (energy efficient equipment, energy saving
behaviours). cloud
• Chemical use and storage – the choice of chemicals being procured, the safe disposal of
leftover chemicals, the impact of chemicals on the environment and long– term health
impacts on humans.
• Green building, green building materials, green building certification and rating: green rating
for integrated habitat assessment (GRIHA), leadership in energy and environmental design
(LEED)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
103
• Tools for Sustainability – Environmental Management System (EMS), ISO14000, life cycle
assessment (LCA)
• Ecological footprint assessment using the Global Footprint Network spreadsheet calculator
• National/Sub national Status of Sustainable Development Goals.
• Develop a campus sustainability plan and prototype, integrating sustainable IT practices and
energy– efficient solutions.
• Develop AI– driven solutions for efficient water management, demonstrating the role of IT in
smart environmental monitoring.
TOTAL: 60 PERIODS
REFERENCES:
1. Allen, D., & Shonnard, D. R. (2011). Sustainable engineering: Concepts, design and case
studies. Prentice Hall.
2. Munier, N. (2005). Introduction to sustainability (pp. 3558– 6). Amsterdam, The Netherlands:
Springer.
3. Blackburn, W. R. (2012). The sustainability handbook: The complete management guide to
achieving social, economic and environmental responsibility. Routledge.
4. Clini, C., Musu, I., & Gullino, M. L. (2008). Sustainable development and environmental
management. Published by Springer, PO Box, 17, 3300.
5. Bennett, M., James, P., & Klinkers, L. (Eds.). (2017). Sustainable measures: Evaluation and
reporting of environmental and social performance. Routledge.
6. Seliger, G. (2012). Sustainable manufacturing for global value creation (pp. 3– 8). Springer
Berlin Heidelberg.
7. Stark, R., Seliger, G., & Bonvoisin, J. (2017). Sustainable manufacturing: Challenges, solutions
and implementation perspectives. Springer Nature.
8. Davim, J. P. (Ed.). (2013). Sustainable manufacturing. John Wiley & Sons.
9. Niklas Sundberg, (2022), Sustainable IT Playbook for Technology Leaders: Design and
implement sustainable IT practices and unlock sustainable business opportunities.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
104
The aim of this course is to encourage the students to identify projects that help in exploring
variables that promote creativity and innovation. Each student is expected to choose a real life or
socially relevant problem. At the end of the project, students should be familiar with the state of art
in their respective fields. They would be able to apply the concepts learnt to relevant research
problems or practical applications. This course is to motivate them to learn concepts, models,
frameworks, and tools that engineering graduates’ need in a world where creativity and innovation
is fast becoming a pre– condition for competitive advantage.
1. Internals
a. First Review
i. Block Diagram of the proposed solution for a societal / creative problem
ii. New Contribution in terms of modifications to existing algorithm or suggestion
of new ones
iii. Detailed Design of each module
iv. Evaluation Metrics
v. Test Cases
b. Second Review
i. Implementation – Justifying pros and Cons
ii. Coding – highlighting what has been reused and what is being written
c. Third Review
i. Test Runs
ii. Performance Evaluation based on Metrics
iii. Project Documentation
2. Externals
● Presentation, Viva– Voce, Report submission.
TOTAL = 60 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
105
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 2 2 – – 3 1 2 1 3 3 2
CO2 3 2 2 2 2 2 1 – 3 1 2 1 2 2 2
CO3 3 2 3 3 1 2 1 – 3 1 2 1 2 3 3
CO4 2 3 2 3 1 2 1 – 3 1 2 2 3 3 3
CO5 2 1 1 3 2 2 1 – 3 1 2 1 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
106
PRACTICALS:
1. Using any simulator, program 8051 Microcontroller in assembly language
a. To test data transfer between registers and memory with different addressing modes.
b. Perform basic ALU operations
2. Write Basic and arithmetic Programs Using Embedded C.
3. Write Embedded C program to test interrupt and timers.
PRACTICALS:
1. Introduction to Raspberry PI platform and python programming
2. Develop a program to control an LED using Raspberry Pi/Arduino
3. Interfacing sensors and actuators with Raspberry PI/Arduino
4. Implement web based IOT.
5. Use wifi module on the board for any simple experiment.
6. Implement application layer protocols using any simulator
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
107
PRACTICALS:
1. Design an IOT based system using any recent controllers, for a specific usecase / application
scenario as a team.
REFERENCES:
1. Muhammed Ali Mazidi, Janice Gillispie Mazidi, Rolin D. McKinlay, “The 8051 Microcontroller
and Embedded Systems using Assembly and C”, Pearson Education, Second Edition, 2014.
2. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, “IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”, Cisco Press, 2017.
3. Muhammad Azhar Iqbal, Sajjad Hussain, Huanlai Xing, Muhammad Ali Imran, Enabling the
Internet of Things, Fundamentals, Design and Applications, Wiley, 2021.
4. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
5. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A Hands– on Approach”, VPT, 2014.
6. Adrian McEwen, Hakim Cassimally “Designing the Internet of Things”, John Wiley & Sons,
2014.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
108
7. Practical Python Programming for IoT: Build advanced IoT projects using a Raspberry Pi 4,
MQTT, RESTful APIs, WebSockets, and Python 3, Packt Publishing, 2020.
8. Samuel Greengard, Internet of Things, The MIT Press, 2021.
9. Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri. Internet of Things: Architectures,
Protocols and Standards, 1st Edition, Wiley Publications, 2019.
10. Wayne Wolf, "Computers as Components – Principles of Embedded Computing System
“Third Edition, Morgan Kaufmann Publisher (An imprint from Elsevier), 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 2 2 – – 2 – – 1 3 2 2
CO2 3 3 3 3 2 2 – – 1 – – 1 3 2 2
CO3 3 3 3 3 1 1 – – 1 – – 1 3 2 2
CO4 3 3 3 3 3 1 – – 3 – – 1 3 2 2
CO5 3 3 3 3 3 1 1 – 3 – – 1 3 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
109
UNIT – I INTRODUCTION 9L
Introduction to AI – Foundations – History – Definition – Future of Artificial Intelligence – Intelligent
Agents: Agents & Environments – Concept of Rationality – Nature of Environments – Structure of
Agents
UNIT – IV LEARNING 9L
Forms of Learning – Supervised Learning – Learning Decision Trees – Regression – Classification
– Artificial Neural Networks – Support Vector Machines – Ensemble Learning – Explanation based
Learning – Learning Using Relevance Information – Statistical Learning – Reinforcement Learning.
UNIT – V APPLICATIONS 9L
AI applications – Language Models – Text Classification – Information Retrieval – Information
Extraction – Machine Translation – Speech Recognition – Object Recognition
TOTAL: 45 PERIODS
COURSE OUTCOMES :
Upon completion of the course, the students will be able to
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
110
3. Analyze and illustrate how search algorithms play vital role in problem solving
4. Illustrate the construction of learning and expert system
5. Discuss current scope and limitations of Al and societal implications
REFERENCES:
1. Russell, S. and Norvig, P. 2020. Artificial Intelligence – A Modern Approach, 4th edition,
Prentice Hall.
2. Kevin Night and Elaine Rich, Shivashankar B. Nair, “Artificial Intelligence”, 3rd Edition, Mc
Graw Hill, 2017
3. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Pearson
Education, 2015
4. Castillo, E., Gutiérrez, J. M., and Hadi, A. S. 2012. Expert Systems and Probabilistic Network
Models, Springer– Verlag.
5. Brachman, R. and Levesque, H. 2004. Knowledge Representation and Reasoning, Morgan
Kaufmann.
6. Alpaydin, E. 2014. Introduction to Machine Learning. 3rd edition, The MIT Press.
7. Sutton R.S. and Barto, A.G. 2018. Reinforcement Learning: An Introduction, 2nd Edition MIT
Press.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PS01 PS02 PS03
CO1 2 2 2 1 2 1 1 2 2 2 1 2 3 2 2
CO2 3 3 2 2 2 1 1 2 2 2 1 2 3 2 2
CO3 2 2 2 2 2 1 1 2 2 2 1 2 2 2 2
CO4 2 2 2 2 3 1 1 2 2 2 1 2 3 3 2
CO5 2 2 2 2 3 1 1 2 2 2 1 2 3 3 2
CO6 3 3 3 2 3 1 1 2 2 2 1 2 3 2 2
1– Low, 2– Medium,3– High,’– ’no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
111
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 3 2 3 3 – 3 3 2 1 3 3 2
CO2 3 3 3 3 2 3 2 2 3 3 2 2 3 3 2
CO3 3 3 3 3 2 2 2 2 3 3 3 2 3 3 3
CO4 3 3 2 2 2 2 2 1 3 3 2 1 3 1 –
CO5 3 3 3 3 2 1 – 2 3 3 3 1 3 3 3
CO6 3 3 2 2 3 2 2 3 3 3 2 2 2 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
112
PRACTICALS:
1. Install the data Analysis and Visualization tool: R/ Python /Tableau Public/ Power BI.
2. Perform Exploratory Data Analysis (EDA) with datasets like email data set. Export all your emails
as a dataset, import them inside a pandas data frame, visualize them and get different insights
from the data.
PRACTICALS:
1. Working with Numpy arrays, Pandas data frames , Basic plots using Matplotlib.
2. Explore various variable and row filters in R for cleaning data. Apply various plot features in R
on sample data sets and visualize.
PRACTICALS:
1. Perform Time Series Analysis and apply the various visualization techniques.
2. Perform Data Analysis and representation on a Map using various Map data sets with Mouse
Rollover effect, user interaction, etc.
PRACTICALS:
1. Build cartographic visualization for multiple datasets involving various countries of the world;
states and districts in India etc.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
113
PRACTICALS:
1. Perform EDA on Wine Quality Data Set.
2. Use a case study on a data set and apply the various EDA and visualization techniques and
present an analysis report.
REFERENCES:
1. Suresh Kumar Mukhiya, Usman Ahmed, “Hands– On Exploratory Data Analysis with Python”,
Packt Publishing, 2020. (Unit 1)
2. Jake Vander Plas, "Python Data Science Handbook: Essential Tools for Working with Data",
First Edition, O Reilly, 2017. (Unit 2)
3. Catherine Marsh, Jane Elliott, “Exploring Data: An Introduction to Data Analysis for Social
Scientists”, Wiley Publications, 2nd Edition, 2008. (Unit 3,4,5)
4. Eric Pimpler, Data Visualization and Exploration with R, GeoSpatial Training service, 2017.
5. Claus O. Wilke, “Fundamentals of Data Visualization”, O’reilly publications, 2019.
6. Matthew O. Ward, Georges Grinstein, Daniel Keim, “Interactive Data Visualization:
Foundations, Techniques, and Applications”, 2nd Edition, CRC press, 2015.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
114
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 3 3 – – – 2 2 3 2 3 3 2
CO2 2 2 2 3 3 – – – 3 2 2 2 1 2 3
CO3 2 3 2 2 3 – – – 2 2 2 1 2 3 1
CO4 2 2 2 2 3 – – – 3 2 2 1 2 2 2
CO5 2 2 3 2 1 – – – 1 2 2 1 2 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
115
PRACTICALS:
1. Implement Data similarity measures using Python.
2. Implement dimension reduction techniques for recommender systems.
PRACTICALS:
1. Implement user profile learning.
2. Implement content– based recommendation systems.
PRACTICALS:
1. Implement collaborative filter techniques.
PRACTICALS:
1. Create an attack for tampering with recommender systems.
PRACTICALS:
1. Implement accuracy metrics like Receiver Operated Characteristic curves.
TOTAL: 30L + 30P = 60 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
116
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Charu C. Aggarwal, Recommender Systems: The Textbook, Springer, 2016.
2. DietmarJannach , Markus Zanker , Alexander Felfernig and Gerhard Friedrich,
Recommender Systems: An Introduction, Cambridge University Press, 2011, 1st ed.
3. Francesco Ricci , LiorRokach , BrachaShapira , Recommender Systems Handbook, 1st ed,
Springer, 2011.
4. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman, Mining of massive datasets, 3rd
edition, Cambridge University Press, 2020.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 1 2 1 – – – 1 – – 1 – – –
CO2 1 2 – – 1 – – – – – – 1 – – –
CO3 2 3 1 – 1 – – – 2 – – – – – –
CO4 3 2 2 2 1 – – – 2 – – 2 – – –
CO5 1 1 – 2 1 – – – – – – 1 – – –
CO6 2 2 1 1 1 – – – – – – 1 – – –
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
117
UNIT – I INTRODUCTION 9L
Data warehouse Introduction – Data warehouse components – operational database vs Data
warehouse – Data warehouse Architecture: Three-tier Data Warehouse Architecture – Autonomous
Data warehouse – Autonomous Data Warehouse Vs Snowflake – Cloud Data warehouse – Modern
Data Warehouse– Concepts of Big Data.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
118
REFERENCES:
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata McGraw
– Hill Edition, Tenth Reprint, 2007.
2. Ralph Kimball, “The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling”
Second edition, 2002.
3. Paul Raj Ponniah, “Data warehousing fundamentals for IT Professionals”, 2012.
4. K.P. Soman, ShyamDiwakar and V. Ajay “Insight into Data mining Theory and Practice”,
Easter Economy Edition, Prentice Hall of India, 2006.
5. Claudia Imhoff, Nicholas Galemmo and Jonathan G.Geiger, “Mastering Data Warehouse
Design”, first edition, Wiley dreamtech India Pvt. Ltd, 2003.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 – – – 3 – – 3 2 2 2
CO2 3 2 2 2 3 – – – 2 – 2 2 3 2 2
CO3 3 3 3 3 – – – – – – – 3 2 2 2
CO4 3 3 3 3 – – – – – – – 3 3 2 2
CO5 3 2 2 2 – 2 – – – – 2 2 2 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
119
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
120
REFERENCES:
1. Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan
Kaufmann Publishers, Third Edition, 2011.
2. G. K. Gupta, Introduction to Data Mining with Case Studies, Eastern Economy Edition,
Prentice Hall of India, 2006.
3. Mehmed Kantardzic, Data mining Concepts, Models, Methods, and Algorithms, Wiley 2011.
4. Alex Berson and Stephen J. Smith, Data Warehousing, Data Mining and OLAP, Tata McGraw
Hill Edition, Tenth Reprint, 2007.
5. Ian.H.Witten, Eibe Frank and Mark.A.Hall, Data Mining: Practical Machine Learning Tools
and Techniques, Morgan Kaufmann, Third Edition, 2011.
6. Bruce Ratner, Statistical and Machine – Learning Data Mining: Techniques for Better
Predictive Modeling and Analysis of Big Data, CRC Press, Second Edition, 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 1 1 – 1 1 3 – – 1 2 1 2 –
CO2 3 3 3 3 3 3 2 1 3 – 1 2 3 3 1
CO3 3 3 3 3 3 3 2 1 3 – 1 2 3 3 2
CO4 3 3 3 3 3 3 2 1 2 – – 3 3 3 3
CO5 3 3 3 3 3 3 2 – 1 – 1 2 3 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
121
PRACTICALS:
1. Use MS– Excel and Power– BI to perform the following experiments using a Business data
set, and make presentations.
2. Students may be encouraged to bring their own real– time socially relevant data set.
I Cycle – MS Excel
1. Explore the features of Ms– Excel.
(i) Get the input from user and perform numerical operations (MAX, MIN, AVG, SUM,
SQRT, ROUND)
(ii) Perform data import/export operations for different file formats.
2. Perform statistical operations – Mean, Median, Mode and Standard deviation, Variance,
Skewness, Kurtosis
PRACTICALS:
1. Perform Z– test, T– test & ANOVA
2. Perform data pre– processing operations i) Handling Missing data ii) Normalization
3. Perform dimensionality reduction operation using PCA, KPCA & SVD
PRACTICALS:
1. Perform bivariate and multivariate analysis on the dataset.
2. Apply and explore various plotting functions on the data set.
UNIT – IV HR & SUPPLY CHAIN ANALYTICS 6L, 6P
Human Resources – Planning and Recruitment – Training and Development – Supply chain network
– Planning Demand, Inventory and Supply – Logistics – Analytics applications in HR & Supply Chain
– Applying HR Analytics to make a prediction of the demand for hourly employees for a year.
PRACTICALS:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
122
1. Explain the real world business problems and model with analytical solutions.
2. Identify the business processes for extracting Business Intelligence
3. Apply predictive analytics for business fore– casting
4. Apply analytics for supply chain and logistics management
5. Use analytics for marketing and sales.
REFERENCES:
1. R. Evans James, Business Analytics, 2nd Edition, Pearson, 2017.
2. R N Prasad, Seema Acharya, Fundamentals of Business Analytics, 2nd Edition, Wiley, 2016.
3. Philip Kotler and Kevin Keller, Marketing Management, 15th edition, PHI, 2016.
4. VSP RAO, Human Resource Management, 3rd Edition, Excel Books, 2010.
5. Mahadevan B, “Operations Management – Theory and Practice”, 3rd Edition, Pearson
Education,2018.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
123
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 3 1 1 – – – 1 2 1 1 3 2 1
CO2 3 3 3 2 3 – – – 1 2 2 2 3 1 2
CO3 2 2 3 3 2 – – – 3 1 1 3 3 1 2
CO4 2 1 1 2 2 – – – 3 3 2 1 1 3 1
CO5 2 3 2 3 2 – – – 3 3 1 3 3 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
124
PRACTICALS:
1. Write a program that computes the T– pyramid of an image.
2. Write a program that derives the quad tree representation of an image using the homogeneity
criterion of equal intensity.
PRACTICALS:
1. Develop programs for the following geometric transforms: (a) Rotation (b) Change of scale (c)
Skewing (d) Affine transform calculated from three pairs of corresponding points (e) Bilinear
transform calculated from four pairs of corresponding points.
PRACTICALS:
1. Develop a program to implement Object Detection and Recognition.
2. Develop a program for motion analysis using moving edges, and apply it to your image
sequences.
PRACTICALS:
1. Develop a program for Facial Detection and Recognition.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
125
REFERENCES:
1. Milan Sonka, Vaclav Hlavac, Roger Boyle, “Image Processing, Analysis, and Machine Vision”,
4th edition, Thomson Learning, 2013.
2. Vaibhav Verdhan, Computer Vision Using Deep Learning Neural Network Architectures with
Python and Keras,Apress, 2021.
3. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer Verlag London
Limited, 2011.
4. Caifeng Shan, FatihPorikli, Tao Xiang, Shaogang Gong, “Video Analytics for Business
Intelligence”, Springer, 2012.
5. D. A. Forsyth, J. Ponce, “Computer Vision: A Modern Approach”, Pearson Education, 2003.
6. E. R. Davies, (2012), “Computer & Machine Vision: Theory, Algorithms, Practicalities”, Fourth
Edition, Academic Press.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 2 2 2 – – – 3 3 2 1 2 1 3
CO2 2 2 3 3 3 – – – 3 2 1 1 2 2 1
CO3 1 2 2 2 3 – – – 1 2 1 2 1 1 3
CO4 1 2 3 2 3 – – – 2 2 2 3 2 2 2
CO5 3 2 1 3 2 – – – 2 1 1 3 3 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
126
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand basics of linguistics and probability and statistics
2. Understand morphology, syntax, semantics and pragmatics
3. Discuss various machine learning techniques used in NLP
4. Understand statistical machine translation and deep learning for NLP
5. Understand the basics of design and implementation of conversational AI.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
127
REFERENCES:
1. Daniel Jurafsky and James H.Martin, “Speech and Language Processing: An Introduction to
Natural Language Processing, Computational Linguistics and Speech Recognition”, Second
Edition, Pearson Education India, 2013.
2. Christopher Manning, “Foundations of Statistical Natural Language Processing”, MIT Press,
2009.
3. Jay Alammar and Maarten Grootendorst, “Hands-On Large Language Models”, O’Reilly
Media,Inc, 2024.
4. Nitin Indurkhya, Fred J. Damerau, “Handbook of Natural Language Processing”, Second
Edition, Chapman & Hall/CRC: Machine Learning & Pattern Recognition, Hardcover, 2010.
5. Yoav Goldberg, Graeme Hirst, “Neural Network Methods for Natural Language Processing
(Synthesis Lectures on Human Language Technologies)”, Morgan and Claypool Life
Sciences, 2017.
6. Deepti Chopra, Nisheeth Joshi, “Mastering Natural Language Processing with Python”, Packt
Publishing Limited, 2016.
7. Mohamed Zakaria Kurdi, “Natural Language Processing and Computational Linguistics:
Speech, Morphology and Syntax (Cognitive Science)”, ISTE Ltd., 2016.
8. Atefeh Farzindar, Diana Inkpen, “Natural Language Processing for Social Media (Synthesis
Lectures on Human Language Technologies)”, Morgan and Claypool Life Sciences, 2015.
9. Denis Rothman, “Transformers for Natural Language Processing: Build, train, and fine– tune
deep neural network architectures for NLP with Python, Hugging Face, and OpenAI's GPT–
3, ChatGPT, and GPT– 4”, Kindle Edition, Packt Publishing, 2022.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 1 – 3 1 – – – 1 – 3 3 3
CO2 3 3 3 2 – 3 1 – – – 1 – 3 3 2
CO3 3 3 3 2 1 3 1 – 1 – 1 3 3 3 3
CO4 3 3 3 2 2 3 1 – 1 – 1 3 3 3 3
CO5 3 3 3 3 2 1 1 – 1 – 2 1 3 3 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
128
PRACTICALS:
SOFTWARE REQUIREMENTS
Cassandra, Hadoop, Java, Pig, Hive and HBase.
1. Downloading and installing Hadoop; Understanding different Hadoop modes. Startup scripts,
Configuration files.
PRACTICALS:
1. Hadoop Implementation of file management tasks, such as Adding files and directories,
retrieving files and Deleting files.
PRACTICALS:
PRACTICALS:
1. Installation of Hive along with practice examples.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
129
1. Describe Big Data and use cases from selected business domains.
2. Explain NoSQL big data management.
3. Install, configure, and run Hadoop and HDFS.
4. Perform map– reduce analytics using Hadoop.
5. Use Hadoop– related tools such as HBase, Cassandra, Pig, and Hive for big data analytics.
REFERENCES:
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
2. Rathinaraja Jeyaraj,Ganesh Kumar Pugalendhi, Anand Paul, "Big Data with Hadoop Map
Reduce A Classroom Approach", Apple Academic Press, CRC Press, Taylor & Francis Group,
2021.
3. Ganesh Chadra Deka, "Nosql: database for Storage and Retrieval of Data in Cloud", CRC Press,
2017.
4. Fru Nde, "The Ultimate Guide to Programming Apache Hive", NextGen Publishing, 2015.
5. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
6. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
7. Alan Gates, "Programming Pig", O'Reilley, 2011.
8. Seema Acharya, Subhashini Chellappan, "Big Data and Analytics", 2nd Edition, Wiley, 2019.
9. Tom White, "Hadoop: The definitive guide",
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
130
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 – – – 2 2 3 1 1 3 3
CO2 3 3 2 3 2 – – – 2 2 3 3 2 3 2
CO3 3 3 3 2 3 – – – 2 2 1 2 2 3 3
CO4 2 3 3 3 3 – – – 2 2 3 2 3 3 2
CO5 3 3 3 3 3 – – – 3 1 3 2 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
131
CS23009 BIOINFORMATICS L T P C
3 0 0 3
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
132
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understanding the basics of molecular structure.
3. Understanding and predicting the structures of GENE, RNA and protein structures.
5. Applying Deep Learning techniques and python libraries for the field of bioinformatics.
REFERENCES:
1. Jeremy Ramsden,” Bioinformatics – An Introduction”, Springer Publications, 2009
1. Harisha, “Fundamentals of Bioinformatics”, IK International House, 2007.
2. SC Rastogi, Parag Rastogi, and Namita Mendiratta “Bioinformatics – Methods and
Applications, Genomics, Proteomics and Drug Discovery”, 5th edition, PHI, 2022.
3. Habib Izadkhah, “Deep Learning in Bioinformatics’, 1st edition, Elsevier, 2022.
4. Sushmita Mitra, Sujay Datta, Theodore Perkins, George Michailidis ,“Introduction to Machine
Learning and Bioinformatics”, CRC Computer Science & Data Analysis, 2019.
5. Faheem Masoodi, Mohammad Quasim, Syed Bukhari, Sarvottam Dixit, Shadab Alam
“Applications of Machine Learning and Deep Learning on Biological Data”, CRC Press, 2023.
CO-PO Mapping
CO1 2 1 1 1 – 2 1 – 2 – – 1 1 2 2
CO2 2 2 2 2 1 2 – – 1 – 1 1 2 2 2
CO3 3 2 2 2 2 2 – – 1 – 1 1 2 2 2
CO4 3 3 3 2 2 3 2 2 – 2 1 2 1 1 3
CO5 3 2 2 2 2 2 – – 2 1 2 2 3 2 3
AVG 2.6 2 2 1.8 1.4 2.2 0.6 0.4 1.2 0.6 0.8 1.4 1.8 1.8 2.4
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
133
Web architecture: Client-Server communication, HTTP protocol, Restful services, HTML5 and
CSS : Semantic Elements, interactive elements, CSS Style sheets, CSS layouts, Responsive web
design, Transforms and animations, Bootstrap Framework.
PRACTICAL LEARNING:
PRACTICAL LEARNING:
PRACTICAL LEARNING:
JDBC Fundamentals, JDBC Architecture and Components, Driver Types and Connection
Management, Statement Types, Result Set Handling.XML: Basic XML-Document Type Definition-
XML Schema, XML Parsers and Validation, XSL.
PRACTICAL LEARNING:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
134
PRACTICAL LEARNING:
REFERENCES:
1. Deitel and Deitel and Nieto, Internet and World Wide Web – How to Program, Prentice Hall,
5th Edition, 2011.
2. Jeffrey C and Jackson, Web Technologies A Computer Science Perspective, Pearson
Education, 2011.
3. Jon Duckett, “HTML and CSS:Design and Build Websites”, Wiley,2011.
4. Terry Felke-Morris, Web Development & Design Foundations with HTML5, 9th Edition.
5. David Flanagan, “JavaScript:The Definitive Guide”, O’Reilly Media, 7th Edition,2020
6. Marty Hall, “Core Servlets and JavaServer Pages”, Prentice Hall,2nd Edition,2003.
7. Adam Freeman, “Pro Angular Build Powerful and Dynamic Web Apps”, Fifth Edition, APress
8. White Fisher, et al.,” JDBC API Tutorial and Reference”, 3rd eds, Addison Wesley, 2003.
REFERNCE LINKS:
1.https://developer.mozilla.org/en-US/docs/Web Mozilla Developer Network(MDN)Web
Documentation.
2.https://devdocs.io.angular/ Angular Official Documentation.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
135
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 1 1 1 2 2 1 2 3 3 3
CO2 3 3 3 3 3 1 – 1 2 2 1 2 3 3 3
CO3 3 3 3 3 3 2 1 2 2 2 2 2 3 3 3
CO4 3 3 3 3 3 2 1 2 2 2 2 2 3 3 3
CO5 3 3 3 3 3 2 1 2 3 3 3 2 3 3 3
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
136
PRACTICALS:
1. Using react native, build a cross platform application for a BMI calculator.
PRACTICALS:
1. Build a cross platform application for a simple expense manager that allows entering expenses
and income on each day and displays category wise weekly income and expense.
2.
UNIT – III HYBRID APP DEVELOPMENT 6L, 6P
Hybrid Web App, Benefits of Hybrid App, Criteria for creating Native App, Tools for creating Hybrid
App, Cons of Hybrid App, Popular Hybrid App Development Frameworks, Ionic, Apache Cordova.
PRACTICALS:
1. Design an android application using Cordova for a user login screen with username, password,
reset button and a submit button. Also, include header image and a label. Use layout managers.
2. Design and develop an android application using Apache Cordova to find and display the current
location of the user.
PRACTICALS:
1. Develop a cross platform application to convert units from imperial system to metric system
( km to miles, kg to pounds etc.,)
2. Design and develop a cross platform application for day– to– day task (to– do) management.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
137
REFERENCES:
1. Head First Android Development, Dawn Griffiths, O’Reilly, 1st edition.
2. Apache Cordova in Action, Raymond K. Camden, Manning. 2015.
3. Full Stack React Native: Create beautiful mobile apps with JavaScript and React Native,
Anthony Accomazzo, Houssein Djirdeh, Sophia Shoemaker, Devin Abbott, FullStack
publishing.
4. Android Programming for Beginners, John Horton, Packt Publishing, 2nd Edition.
5. Native Mobile Development by Shaun Lewis, Mike Dunn.
6. Building Cross– Platform Mobile and Web Apps for Engineers and Scientists: An Active
Learning Approach, Pawan Lingras, Matt Triff, RuchaLingras.
7. Apache Cordova 4 Programming, John M Wargo, 2015.
8. React Native Cookbook, Daniel Ward, Packt Publishing, 2nd Edition.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
138
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 1 2 3 – – – 1 1 2 1 2 3 3
CO2 2 1 3 2 2 – – – 3 2 2 3 3 2 1
CO3 2 2 2 1 2 – – – 1 1 1 1 1 1 2
CO4 1 3 1 1 3 – – – 1 1 3 2 1 3 1
CO5 1 1 3 1 3 – – – 1 1 2 1 3 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
139
PRACTICALS:
Create a Cloud Organization in AWS/Google Cloud/or any equivalent Open Source cloud
softwares like Openstack, Eucalyptus, OpenNebula with Role– based access control.
PRACTICALS:
Create a Cost– model for a web application using various services and do Cost– benefit analysis.
PRACTICALS:
Create alerts for usage of Cloud resources
PRACTICALS:
Create Billing alerts for your Cloud Organization
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
140
PRACTICALS:
1. Compare Cloud cost for a simple web application across AWS, Azure and GCP.
1. Exhibit cloud– design skills to build and automate business solutions using cloud
technologies.
2. Possess Strong theoretical foundation leading to excellence and excitement towards adoption
of cloud– based services.
3. Solve the real world problems using Cloud services and technologies.
4. Analyze applications of Cloud Service Governance models.
5. Analyze the cloud services in various environments.
REFERENCES:
1. Cloud Service Management and Governance: Smart Service Management in Cloud Era by
EnamulHaque, Enel Publications,2023.
1. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl, Ricardo Puttini,
Zaigham Mohammad, Prentice Hall Publication, 2013.
2. Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour, Prentice
Hall Publication, 2015.
3. Economics of Cloud Computing by Praveen Ayyappa, LAP Lambert Academic Publishing,
2020.
4. Mastering Cloud Computing Foundations and Applications Programming, Rajkumar Buyya,
Christian Vechhiola, S. ThamaraiSelvi, MK, 2013.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 1 1 1 – – – 2 1 3 2 2 1 3
CO2 3 1 2 3 2 – – – 1 2 3 1 2 2 2
CO3 1 1 3 1 3 – – – 3 3 1 1 3 2 1
CO4 3 3 3 3 3 _ _ _ 3 3 2 2 2 1 1
CO5 3 3 3 3 3 _ _ _ 3 3 2 2 1 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
141
PRACTICALS:
Designing a Responsive layout for a societal application.
PRACTICALS:
Exploring various UI Interaction Patterns
PRACTICALS:
Developing an interface with proper UI Style Guides
PRACTICALS:
1. Developing Wireflow diagram for application using open source software
2. Exploring various open source collaborative interface Platform
3. Hands on Design Thinking Process for a new product
4. Brainstorming feature for proposed product.
5. Defining the Look and Feel of the new Project.
6. Create a Sample Pattern Library for that product (Mood board, Fonts, Colors based on UI
principles).
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
142
REFERENCES:
1. Joel Marsh, “UX for Beginners”, O’Reilly, 2022.
2. Jon Yablonski, “Laws of UX using Psychology to Design Better Product & Services” O’Reilly
2021.
3. Jenifer Tidwell, Charles Brewer, Aynne Valencia, “Designing Interface” 3 rd Edition, O’Reilly
2020.
4. Steve Schoger, Adam Wathan “Refactoring UI”, 2018.
5. Steve Krug, “Don't Make Me Think, Revisited: A Commonsense Approach to Web & Mobile”,
Third Edition, 2015
6. https://www.nngroup.com/articles/
7. https://www.interaction– design.org/literature.
CO– PO Mapping
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
143
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 3 1 – – – 3 3 2 1 3 3 1
CO2 2 3 1 3 2 – – – 1 2 2 2 1 2 2
CO3 1 3 3 2 2 – – – 2 3 1 2 1 3 3
CO4 1 2 3 3 1 – – – 3 2 1 3 3 3 3
CO5 1 2 3 2 1 – – – 2 1 1 1 3 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
144
PRACTICALS:
1. Develop the test plan for testing an e– commerce web/mobile application (www.amazon.in).
2. Design the test cases for testing the e– commerce application
3. Test the e– commerce application and report the defects in it.
4. Develop the test plan and design the test cases for an inventory control system
5. Execute the test cases against a client server or desktop application and identify the defects.
6. Test the performance of the e– commerce application
PRACTICALS:
1. Automate the testing of e– commerce applications using Selenium
PRACTICALS:
1. Integrate TestNG with the above test automation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
145
PRACTICALS:
1. Mini Project:
a) Build a data– driven framework using Selenium and TestNG
b) Build Page object Model using Selenium and TestNG
c) Build BDD framework with Selenium, TestNG and Cucumber
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand the basic concepts of software testing and the need for software testing
2. Design test planning and different activities involved in test planning
3. Design effective test cases that can uncover critical defects in the application
4. Carry out advanced types of testing
5. Automate the software testing using Selenium and TestNG
REFERENCES:
1. Yogesh Singh, “Software Testing”, Cambridge University Press, 2012
2. UnmeshGundecha, Satya Avasarala, "Selenium WebDriver 3 Practical Guide" – Second
Edition 2018
8. Glenford J. Myers, Corey Sandler, Tom Badgett, The Art of Software Testing, 3rd Edition,
2012, John Wiley & Sons, Inc.
9. Ron Patton, Software testing, 2nd Edition, 2006, Sams Publishing
10. Paul C. Jorgensen, Software Testing: A Craftsman’s Approach, Fourth Edition, 2014, Taylor
& Francis Group.
11. Carl Cocchiaro, Selenium Framework Design in Data– Driven Testing, 2018, Packt
Publishing.
12. Elfriede Dustin, Thom Garrett, Bernie Gaurf, Implementing Automated Software Testing,
2009, Pearson Education, Inc.
13. Satya Avasarala, Selenium WebDriver Practical Guide, 2014, Packt Publishing.
14. Varun Menon, TestNg Beginner's Guide, 2013, Packt Publishing.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
146
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 1 2 – – – 1 1 3 2 3 2 3
CO2 2 3 1 1 1 – – – 2 2 1 2 1 2 3
CO3 2 2 1 3 1 – – – 1 3 1 2 2 3 2
CO4 2 1 3 2 1 – – – 1 1 1 2 3 1 2
CO5 2 2 1 3 1 – – – 1 3 2 1 2 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
147
PRACTICALS:
1. Identify the vulnerabilities using OWASP ZAP tool
2. Make a report on top 10 OWASP vulnerability.
3. Malware Analysis tool JOTTI
PRACTICALS:
1. Create simple REST API using python for following operation
a. GET
b. PUSH
c. POST
d. DELETE
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
148
PRACTICALS:
1. Install Burp Suite to do following vulnerabilities:
a. SQL injection
b. cross– site scripting (XSS)
2. Be acquainted with the process for secure development and deployment of web applications.
3. Acquire the skill to design and develop Secure Web Applications that use Secure APIs.
4. Be able to get the importance of carrying out vulnerability assessment and penetration testing.
5. Acquire the skill to think like a hacker and to use hackers tool sets.
REFERENCES:
1. Andrew Hoffman, Web Application Security: Exploitation and Countermeasures for Modern
Web Applications, First Edition, 2020, O’Reilly Media, Inc.
2. Bryan Sullivan, Vincent Liu, Web Application Security: A Beginners Guide, 2012, The
McGraw– Hill Companies.
3. Neil Madden, API Security in Action, 2020, Manning Publications Co., NY, USA.
15. Michael Cross, Developer’s Guide to Web Application Security, 2007, Syngress Publishing,
Inc.
16. Ravi Das and Greg Johnson, Testing and Securing Web Applications, 2021, Taylor & Francis
Group, LLC.
17. Prabath Siriwardena, Advanced API Security, 2020, Apress Media LLC, USA.
18. Malcom McDonald, Web Security for Developers, 2020, No Starch Press, Inc.
19. Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams
Grey Hat Hacking: The Ethical Hacker’s Handbook, Third Edition, 2011, The McGraw– Hill
Companies.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
149
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 2 1 3 1 1 _ 1 1 – 1 1 2 1
CO2 2 1 2 1 3 1 1 _ 1 1 – – 2 2 1
CO3 1 1 1 2 3 1 1 1 1 1 – 1 1 1 1
CO4 1 2 1 1 2 1 1 1 1 1 – – 1 1 1
CO5 1 2 2 2 2 1 1 1 1 1 – 1 1 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
150
CS23016 DEVOPS L T P C
2 0 2 3
PRACTICALS:
1. Create Maven Build pipeline in Azure
2. Run regression tests using Maven Build pipeline in Azure
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
151
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand different actions performed through Version control tools like Git.
2. Automate test cases using Maven & Gradle
3. Perform Continuous Integration, Continuous Testing and Continuous Deployment using
Jenkins Build and Jenkins workspace.
4. Ability to Perform Automated Continuous Deployment and to do configuration management
using Ansible
5. Understand to leverage Cloud– based DevOps tools using Azure DevOps
REFERENCES:
1. Roberto Vormittag, “A Practical Guide to Git and GitHub for Windows Users: From Beginner
to Expert in Easy Step– By– Step Exercises”, Second Edition, Kindle Edition, 2016.
2. Jason Cannon, “Linux for Beginners: An Introduction to the Linux Operating System and
Command Line”, Kindle Edition, 2014
3. Hands– On Azure Devops: Cicd Implementation For Mobile, Hybrid, And Web Applications
Using Azure Devops And Microsoft Azure: CICD Implementation for ... DevOps and Microsoft
Azure (English Edition) Paperback – 1 January 2020 by Mitesh Soni
4. Jeff Geerling, “Ansible for DevOps: Server and configuration management for humans”, First
Edition, 2015.
5. David Johnson, “Ansible for DevOps: Everything You Need to Know to Use Ansible for
DevOps”, Second Edition, 2016.
6. Mariot Tsitoara, “Ansible 6. Beginning Git and GitHub: A Comprehensive Guide to Version
Control, Project Management, and Teamwork for the New Developer”, Second Edition, 2019.
7. https://www.jenkins.io/user– handbook.pdf
8. https://maven.apache.org/guides/getting– started/
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 – – – – – – – 2 2 2
CO2 3 3 3 2 3 – – – – – – – 2 2 2
CO3 3 3 3 2 3 – – – – – – – 2 2 2
CO4 3 3 3 2 3 – – – – – – – 2 2 2
CO5 3 3 3 2 3 – – – – – – – 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
152
UNIT – I INTRODUCTION 6L
The art of Language design – Programming language spectrum – Compilation and Interpretation
– Evoluation of Programming languages – Languages – Syntax – Lexical and Syntax Analysis
and C– lite
UNIT – II PROGRAMMING CONSTRUCTS AND MEMORY 12L
MANAGEMENT
Names – Types – Type Systems – Binding – Scope – Static – Dynamic – Abstract Data types-
Expression–Assignment–Controlflow–Input/Output–Exception handling–Functions–Call and
Return–Parameter passing- Memory Management–Dynamic Arrays–Garbage Collection
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
153
REFERENCES:
1. Michael LScott,"Programming Language Pragmatics", Fourth Edition, Morgan Kauffman,
2015.
2. AllenB.Tucker and Robert E. Noonan, "Programming Languages Principles and Paradigms",
Second Edition,Tata McGraw Hill,2009.
3. Daniel P.Friedman and Mitchell Wand, "Essentials of Programming Languages", Third
Edition, The MIT Press, 2008.
4. Robert W. Sebesta, "Concepts of Programming Languages", 12th Edition, Pearson Education
Limited, 2022.
5. Terrence W.Pratt, Marvin V. Zelkowitz, "Programming Languages: Design and
Implementation", 4th Edition, Pearson, 2000.
6. Kenneth Louden and Kenneth Lambert, "Programming Languages: Principles and Practices",
3rd Edition, Cengage Learning, 2011.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 – 2 – – – – – 1 2 3 1 1
CO2 3 3 3 3 3 1 – – – – 2 2 3 3 2
CO3 3 3 3 3 3 1 1 – 1 – 2 3 3 3 2
CO4 3 3 3 3 2 1 1 – 2 – – 2 2 3 2
CO5 3 3 3 3 2 1 – – 2 – 2 2 2 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
154
UNIT – I INTRODUCTION 9L
Project – Software Projects versus Other Types of Project – Contract Management and Technical
Project Management – Activities covered by Software Project Management – Overview of
Stepwise project planning – Project evaluation: Strategic assessment, Technical assessment,
Cost– Benefit Analysis, Cash– flow forecasting, Cost– Benefit Evaluation Techniques, Risk
Evaluation.
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
155
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Perform stepwise project planning.
2. Perform cost– benefit analysis and cash– flow forecasting techniques.
3. Apply function point analysis.
4. Model project scheduling using CPM or precedence networks.
5. Perform risk analysis and risk reduction.
REFERENCES:
1. Bob Hughes, Mike Cotterell, “Software Project Management”, Fifth Edition, Tata McGraw Hill,
2009.
2. Royce Walker,”Software Project Management”, First Edition, Pearson Education, 2002.
3. Adolfo Villafiorita,” Introduction to Software Project Management”, First Edition, Auerbach
publication, 2016.
4. Ashfaque Ahmed, “Software Project Management: A Process– Driven Approach”, First Edition,
CRC Press, 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 2 – 2 2 3 2 2 2 3
CO2 3 3 3 3 2 2 3 – 2 2 3 3 1 3 3
CO3 3 3 3 2 1 2 2 – 2 2 3 2 1 3 3
CO4 3 3 3 3 3 2 2 – 2 2 3 1 1 3 3
CO5 3 3 3 1 2 2 3 – 2 3 3 3 1 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
156
PRACTICALS:
1. Explore public cloud services including Amazon, Google, Salesforce, and Digital Ocean
2. Install Oracle Virtual Box/VMware Workstation and Create a Blackboard Application
[Hint: One VM should act as a master and other VMs will act as listeners. When any content is
written by the master VM, the content should be displayed in all the Listener VMs].
PRACTICALS:
1. Install KVM / Xen and create VM using image templates
2. Install a C compiler in the virtual machine created using virtual box and execute Simple
Programs
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
157
PRACTICALS:
1.
Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not present
in CloudSim.
2.Find a procedure to transfer the files from one virtual machine to another virtual machine
UNIT – V CLOUD SECURITY 6L+6P
Virtualization System– Specific Attacks: Guest hopping – VM migration attack – hyper jacking.
Data Security and Storage; Identity and Access Management (IAM) – IAM Challenges – IAM
Architecture and Practices.
PRACTICALS:
1. Install Hadoop single node cluster and run simple applications like word count.
2. Creating and Executing Your First Container using Docker.
3. Run a Container from Docker Hub
REFERENCES:
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
3. James Turnbull, “The Docker Book”, Turnbull Press, 2014.
4. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
5. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an
enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.
6. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, “Mastering the Cloud Computing
Foundations and Applications Programming”, Morgan Kaufmann,2013
7. John Gilbert, “Cloud Native Development Patterns and Best Practices: Practical architectural
patterns for building modern, distributed cloud-native systems”, Packt Publishing, 2018.
8. Chris Dotson , “Practical Cloud Security: A guide for secure design and deployment”, O'Reilly
Media, 2019
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
158
CO – PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 1 1 1 – – – 2 3 1 3 2 1 3
CO2 3 1 2 2 1 – – – 1 2 1 3 2 2 1
CO3 2 3 2 3 1 – – – 3 1 1 3 1 1 1
CO4 1 2 3 3 3 – – – 3 3 1 2 1 3 3
CO5 2 3 3 1 3 – – – 2 2 1 2 2 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
159
CS23020 VIRTUALIZATION L T P C
2 0 2 3
PRACTICALS:
1. Create type 2 virtualization in VMware. Allocate memory and storage space as per
requirement. Install Guest OS on that VMware.
2. Shrink and extend virtual disk
3. Create, Manage, Configure and schedule snapshots
PRACTICALS:
1. Create Spanned, Mirrored and Striped volume
2. Create RAID 5 volume
PRACTICALS:
1. Desktop Virtualization using VNC
2. Desktop Virtualization using Chrome Remote Desktop
3. Create type 2 virtualization on ESXI 6.5 server
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
160
PRACTICALS:
1. Create a VLAN in CISCO packet tracer
2. Install KVM in Linux
REFERENCES:
1. Anthony T.Velte , Toby J. Velte Robert Elsenpeter , “Cloud computing a practical approach”,
TATA McGraw– Hill , New Delhi, 2010
1. RajkumarBuyya, James Broberg, Andrzej Goscinski, “Cloud Computing (Principles and
Paradigms)”, John Wiley & Sons, Inc. 2011
2. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center”, CRC Press, 2006.
3. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress, 2005.
4. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
5. Peter von Oven, Mastering VMware Horizon 8: An Advanced Guide to Delivering Virtual
Desktops and Virtual Apps, APress, 2021.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
161
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 3 1 3 2 – – – 1 1 3 1 2 3 2
CO2 3 2 2 1 2 – – – 1 2 2 3 3 2 1
CO3 3 2 1 3 1 – – – 2 2 1 3 3 3 2
CO4 1 1 2 3 3 – – – 3 3 1 1 3 2 2
CO5 3 3 2 1 3 _ _ _ 3 3 2 2 1 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
162
UNIT – I INTRODUCTION 9L
Overview of Visualization: Role of Humans and Computers in the loop – External Representation
and Data Presentation –Interactivity – Vast Design space – Task Focused Design-Enhancing
Effectiveness. Data Abstraction: Data Types – Dataset Types – Attribute Types and Semantics –
Data Transformation Operations-Validation Approaches. Task Abstraction: Actions: Actions –
Targets – Task Analysis Methods – Task abstraction examples
COURSE OUTCOMES:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
163
REFERENCES:
1. Tamara Muzner, “Visualization Analysis and Design”, CRC Press, First Edition, 2014.
3. Colin Ware, “Information Visualization: Perception for Design (Interactive Technologies)”,
Morgan Kauffman Publishers, 2012.
4. Andy Kirk, “Data Visualisation: A Handbook for Data Driven Design“, Sage Publications, First
Edition, 2016.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 1 1 1 2 2 2 2 3 3 3
CO2 3 3 3 2 3 1 1 1 2 2 2 2 3 3 3
CO3 3 3 3 3 3 1 1 1 2 2 2 2 3 3 3
CO4 3 3 3 3 3 1 1 1 2 2 2 2 3 3 3
CO5 3 3 3 3 3 1 1 1 2 2 3 2 3 3 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
164
UNIT – I INTRODUCTION 9L
General Overview: History – System Structure – User Perspective – Operating System Services
– Assumptions about Hardware. Introduction to Kernel: Architecture of UNIX Operating System –
Introduction to System Concepts
UNIT – II BUFFER 9L
The Buffer Cache – Buffer Headers – Structure of the Buffer Pool – Scenarios for Retrieval of a
Buffer – Reading and Writing Disk Blocks – Advantages and Disadvantages of the Buffer Cache
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
165
REFERENCES:
1. Maurice J. Bach, “The Design of the Unix Operating System”, Pearson Education, 2015.
2. B. Goodheart, J. Cox, “The Magic Garden Explained”, Prentice Hall of India,1986.
3. S. J. Leffler, M. K. Mckusick, M. J. .Karels and J. S. Quarterman., “The Design and
Implementation of the 4.3 BSD Unix Operating System”, Addison Wesley, 1998.
4. Evi Nemeth, Garth Snyder, Trent R. Hein, and Ben Whaley, “UNIX and Linux System
Administration Handbook”, Addison– Wesley, 2017.
5. W. Richard Stevens and Stephen A. Rago, “Advanced Programming in the UNIX
Environment”, Addison– Wesley Educational Publishers Inc, 2013.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 2 1 1 – – – – 1 3 3 3 2
CO2 3 2 2 2 1 1 – – – – 1 3 3 3 2
CO3 3 2 2 2 2 1 – – 1 – 1 2 3 3 3
CO4 3 2 2 2 1 1 – – 1 – 1 2 3 3 3
CO5 3 2 2 2 1 1 – – 1 – 1 2 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
166
UNIT – I INTRODUCTION 9L
Introduction to Information Storage: Digital data and its types, Information storage, Key
characteristics of data center and Evolution of computing platforms. Information Lifecycle
Management. Third Platform Technologies: Cloud computing and its essential characteristics,
Cloud services and cloud deployment models, Big data analytics, Social networking and mobile
computing, Characteristics of third platform infrastructure and Imperatives for third platform
transformation. Data Center Environment: Building blocks of a data center, Compute systems and
compute virtualization and Software– defined data center– Key Characteristics of a Data Center–
Major Data Centres from CSPs – Challenges in DC– Case study.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
167
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. EMC Corporation, Information Storage and Management, Wiley, India, 2010
1. Jon Tate, Pall Beck, Hector Hugo Ibarra, Shanmuganathan Kumaravel and Libor Miklas,
Introduction to Storage Area Networks, Ninth Edition, IBM – Redbooks, December 2017.
2. Ulf Troppens, Rainer Erkens, Wolfgang Mueller– Friedt, Rainer Wolafka, Nils Haustein ,
Storage Networks Explained, Second Edition, Wiley, 2009.
3. Gerardus Blokdyk, Storage Technologies A Complete Guide, 2019
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 1 3 3 – – – 1 1 1 3 1 2 1
CO2 3 1 2 3 3 – – – 3 2 3 2 2 3 1
CO3 1 1 3 2 2 – – – 3 1 1 2 2 3 3
CO4 3 2 1 2 2 – – – 1 1 3 1 3 2 1
CO5 1 3 2 1 2 – – – 1 2 3 1 3 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
168
PRACTICALS:
Setup your own virtual SDN lab
I. Virtualbox/Mininet Environment for SDN http://mininet.orghttps://www.kathara.org
GNS3
PRACTICALS:
Create a simple mininet topology with SDN controller and use Wireshark to capture and visualize
the OpenFlow messages such as OpenFlow FLOW MOD, PACKET IN, PACKET OUT etc.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
169
Network Virtualization – Virtual LANs – OpenFlow VLAN Support – NFV Concepts – Benefits
and Requirements – Reference Architecture- NFV Infrastructure – Virtualized Network Functions
– NFV Management and Orchestration – NFV Use cases - SDN and NFV, NFV at ETSI.
PRACTICALS:
Create a simple end– to– end network service with two VNFs using vim– emu
https://github.com/containernet/vim– emu
UNIT – V QOS AND SECURITY 6L+6P
QoS Architectural Framework, OpenFlow QoS Support, Integrated Services Architecture- ISA
Services, Differentiated Services - DiffServ Field - DiffServ Configuration and Operation, Service
Level Agreements, Cloud Deployment Models. Cloud Architecture - NIST Cloud Computing
Reference Architecture, ITU-T Cloud Computing Reference Architecture, Security – SDN, NFV
and Cloud.
PRACTICALS:
OpenDaylight’s Virtual Tenant Network construction
REFERENCES:
1. William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT and Cloud”,
Pearson Education, 1st Edition, 2015.
6. Thomas D Nadeau, Ken Gray, “SDN: Software Defined Networks”, O’Reilly Media, 2013.
7. Fei Hu, “Network Innovation through OpenFlow and SDN: Principles and Design”, 1st Edition,
CRC Press, 2014.
8. Paul Goransson, Chuck Black Timothy Culver, “Software Defined Networks: A
Comprehensive Approach”, 2nd Edition, Morgan Kaufmann Press, 2016.
9. Oswald Coker, SiamakAzodolmolky, “Software– Defined Networking with OpenFlow”, 2nd
Edition, O’Reilly Media, 2017.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
170
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 3 1 3 – – – 2 3 1 3 1 2 1
CO2 2 1 2 2 3 – – – 2 2 2 2 1 3 2
CO3 2 2 2 3 3 – – – 3 1 1 2 1 3 3
CO4 2 2 2 3 1 – – – 1 3 1 2 2 2 2
CO5 3 3 1 1 3 – – – 1 2 1 2 2 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
171
PRACTICALS:
Create a Real– time Stream processing application using Spark Streaming
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
172
Apache Kafka, Kafka as Event Streaming platform, Events, Producers, Consumers, Topics,
Partitions, Brokers, Kafka APIs, Admin API, Producer API, Consumer API, Kafka Streams API,
Kafka Connect API – Use Cases of Kafka Event Streaming
PRACTICALS:
Real– time Fraud and Anomaly Detection
PRACTICALS:
Real– time personalization, Marketing, Advertising
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Exhibit stream data processing skills to build business solutions using latest data
processing tools & technologies
2. Possess Strong practical foundation leading to excellence and excitement towards
adoption of streaming data solutions
3. Solve real world problems using Streaming Data technological components
REFERENCES:
1. Streaming Systems: The What, Where, When and How of Large– Scale Data Processing by
Tyler Akidau, SlavaChemyak, Reuven Lax, O’Reilly publication,2018.
2. Designing Data– Intensive Applications by Martin Kleppmann, O’Reilly Media, 2017.
3. Practical Real– time Data Processing and Analytics: Distributed Computing and Event
Processing using Apache Spark, Flink, Storm and Kafka, by ShilpiSaxena,
SaurabhGupta,Packt Publishing,2017.
4. https://spark.apache.org/docs/latest/streaming– programming– guide.html,2023.
5. https://kafka.apache.org/, 2023.
CO– PO Mapping
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
173
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 2 3 3 – – – 3 1 1 2 1 3 3
CO2 2 2 2 3 1 – – – 1 3 1 2 2 2 2
CO3 3 3 1 1 3 – – – 1 2 1 2 2 1 3
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
174
PRACTICALS:
PRACTICALS:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
175
REFERENCES:
1. Mather, Kumaraswamy, and Latif, Cloud Security and Privacy, OREILLY, 2011.
2. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
3. Chris Dotson, Practical Cloud Security, O'Reilly Media, 2019.
4. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi,"Mastering the Cloud Computing”, Morgan
Kaufmann, 2013.
5. Dave shackleford, Virtualization Security: Protecting Virtualized Environments, SYBEX a wiley
Brand, 2012.
6. Mark C. Chu-Carroll, Code in the CIoud, Pragmatic Bookshelf, 2011
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 1 2 - - - 1 1 1 3 3 1 2
CO2 1 3 2 3 1 - - - 2 2 3 2 3 1 2
CO3 3 2 2 3 2 - - - 3 1 1 2 2 3 1
CO4 2 1 2 3 3 - - - 3 2 3 3 1 1 2
CO5 1 3 3 1 1 - - - 2 3 3 2 2 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
176
COURSE OBJECTIVES:
1. To acquire a basic knowledge of GPU along with programming and execution model of CUDA
2. To familiarize memory handling, error handling and optimization in CUDA
3. To understand the programming with multiple streams and Multi GPUs
4. To know the parallel programming models for massively parallel processors and
heterogeneous architectures
5. To understand different application development environments and issues in parallel
programming
UNIT – I UNDERSTANDING PARALLELISM, CUDA PROGRAMMING 9L
AND EXECUTION MODEL
Heterogeneous Parallel computing with CUDA – CUDA programming model – Timing your kernel
– Organizing Parallel Threads – CUDA Execution Model – Understanding nature of warp
execution – Exposing parallelism
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
177
COURSE OUTCOMES:
REFERENCES:
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 - - - 3 – – – - - – 1 3 2 –
CO2 3 3 - - 3 – – – - - – - 3 2 –
CO3 - - 3 3 2 – – – 2 - – - 3 2 –
CO4 - - 3 - 3 – – – 2 - – - 3 2 –
CO5 3 - - - 3 – – – - - 2 - 3 2 –
1’ = Low; ‘2’ = Medium; ‘3’ = High
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
178
3. Using FOCA / Search Diggity tools, extract metadata and expanding the target list.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
179
Access control requirements for Cloud infrastructure – User Identification – Authentication and
Enumeration Concepts – NetBIOS Enumeration – SNMP, LDAP, NTP, SMTP and DNS
Enumeration – Vulnerability Assessment Concepts – Desktop and Server OS Vulnerabilities –
Windows OS Vulnerabilities – Tools for Identifying Vulnerabilities in Windows– Linux OS
Vulnerabilities – Vulnerabilities of Embedded OS
PRACTICALS:
1. Aggregate information from public databases using online free tools like Paterva’s Maltego.
2. Information gathering using tools like Robtex.
PRACTICALS:
1. Scan the target using tools like Nessus.
2. View and capture network traffic using Wireshark.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
180
REFERENCES:
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and
Network Defense, Course Technology, Delmar Cengage Learning, 2010.
2. Patrick Engebretson, The Basics of Hacking and Penetration Testing, SYNGRESS, Elsevier,
2013.
3. Dafydd Stuttard and Marcus Pinto, The Web Application Hacker’s Handbook: Finding and
Exploiting Security Flaws, 2011.
4. Justin Seitz, Black Hat Python: Python Programming for Hackers and Pentesters, 2014.
5. Daniel G. Graham, Ethical Hacking: A Hands-on Introduction to Breaking In, 2021
6. Lee Allen Advanced penetration Testing for Highly-secured Environments: The Ultimate
Security Guide, Packt publishing 2012
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 3 2 1 – – – 1 2 2 1 1 2 3
CO2 1 2 1 2 1 – – – 2 2 1 1 1 2 2
CO3 2 2 3 3 1 – – – 1 2 1 2 2 3 1
CO4 2 1 1 2 1 – – – 1 3 3 3 3 2 1
CO5 2 3 1 1 2 – – – 2 1 1 1 1 1 3
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
181
PRACTICALS:
1. Installation of Sleuth Kit on Linux. List all data blocks. Analyze allocated as well as unallocated
blocks of a disk image.
PRACTICALS:
1. Install Mobile Verification Toolkit or MVT and decrypt encrypted iOS backups.
2. Process and parse records from the iOS system.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
182
PRACTICALS:
1. Extract installed applications from Android devices.
2. Extract diagnostic information from Android devices through the ADB protocol.
3. Generate a unified chronological timeline of extracted records.
REFERENCES:
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In– depth Guide to Mobile Device Forensics”, First Edition, CRC Press,
2022.
3. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River
Media, 2005, ISBN: 1– 58450– 389.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 2 1 – – – 1 1 3 3 1 3 1
CO2 3 3 3 3 3 – – – 2 2 1 2 1 3 1
CO3 3 3 2 3 1 – – – 3 2 1 1 3 2 3
CO4 3 1 2 2 3 – – – 1 3 3 2 1 3 3
CO5 1 3 2 3 2 – – – 2 3 2 3 1 2 1
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
183
PRACTICALS:
1. Design own social media application.
2. Implement secure search in social media.
PRACTICALS:
1. Create a Network model using Neo4j.
2. Find “Friend of Friends” using Neo4j.
PRACTICALS:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
184
REFERENCES:
1. Peter Mika, Social Networks and the Semantic Web, First Edition, Springer 2007.
2. BorkoFurht, Handbook of Social Network Technologies and Application, First Edition,
Springer, 2010.
3. Jérôme Baton, Rik Van Bruggen, Learning Neo4j 3.x, Second Edition, Packt Publishing,
2017.
4. David Easley, Jon Kleinberg, Networks, Crowds, and Markets: Reasoning about a Highly
Connected World‖, First Edition, Cambridge University Press, 2010.
5. Jackson, Matthew O., Social and Economic Networks‖, Princeton University Press, 2008.
6. GuandongXu ,Yanchun Zhang and Lin Li, ―Web Mining and Social Networking –
Techniques and applications‖, First Edition, Springer, 2011.
7. Dion Goh and Schubert Foo, Social information Retrieval Systems: Emerging
Technologies and Applications for Searching the Web Effectively‖, IGI Global Snippet,
2008.
8. Max Chevalier, Christine Julien and Chantal Soulé– Dupuy, Collaborative and Social
Information Retrieval and Access: Techniques for Improved user Modeling‖, IGI Global
Snippet, 2009.
9. John G. Breslin, Alexander Passant and Stefan Decker, The Social Semantic Web‖,
Springer, 2009.
10. Brij B. Gupta, Somya Ranjan Sahoo, Online Social Networks Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, 2023
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 2 3 2 – – – 3 2 1 2 3 3 2
CO2 2 2 2 3 3 – – – 1 2 2 3 3 3 2
CO3 2 1 1 3 2 – – – 1 2 1 1 1 3 3
CO4 3 3 3 3 2 – – – 1 1 1 1 2 1 3
CO5 1 3 2 2 2 – – – 1 1 3 1 2 3 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
185
UNIT – I INTRODUCTION 6L
Basics of Symmetric Key Cryptography, Basics of Asymmetric Key Cryptography, Hardness of
Functions. Notions of Semantic Security (SS) and Message Indistinguishability (MI): Proof of
Equivalence of SS and MI, Hard Core Predicate, Trap– door permutation, Goldwasser– Micali
Encryption. Goldreich– Levin Theorem: Relation between Hardcore Predicates and Trap– door
permutations.
PRACTICALS:
1. Implement Feige– Fiat– Shamir identification protocol.
PRACTICALS:
1. Implement Schnorr identification protocol.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
186
PRACTICALS:
1. Implement Rabin one– time signature scheme.
2. Implement Merkle one– time signature scheme.
3. Implement Authentication trees and one– time signatures.
4. Implement GMR one– time signature scheme.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications, Springer
Verlag, 2007.
1. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced Edition),
2003.
2. Shaffi Goldwasser and MihirBellare, Lecture Notes on Cryptography, Available at
http://citeseerx.ist.psu.edu/., 2001.
3. OdedGoldreich, Foundations of Cryptography, CRC Press (Low Priced Edition Available), Part 1
and Part 23, 2009.
4. William Stallings, “Cryptography and Network Security: Principles and Practice”, PHI 3rd Edition,
2006.
5. Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, 2nd edition, CRC Press
2014
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 1 – – – 2 1 1 2 2 1 1
CO2 1 3 2 1 2 – – – 3 2 2 2 2 1 3
CO3 1 1 2 3 2 – – – 1 1 1 3 1 1 3
CO4 3 1 2 1 3 – – – 3 2 1 2 3 2 1
CO5 2 3 3 3 3 – – – 3 1 1 1 2 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
187
PRACTICALS:
Implement Cross Site Scripting and Prevent XSS.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
188
PRACTICALS:
Penetration test using kali Linux.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Julia H. Allen, “Software Security Engineering”, Pearson Education, 2008.
2. Evan Wheeler, “Security Risk Management: Building an Information Security Risk
Management Program from the Ground Up”, First edition, Syngress Publishing, 2011.
3. Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin, “The Art of Software
Security Testing: Identifying Software Security Flaws (Symantec Press)”, Addison– Wesley
Professional, 2006.
4. Robert C. Seacord, “Secure Coding in C and C++ (SEI Series in Software Engineering)”,
Addison– Wesley Professional, 2005.
5. Jon Erickson, “Hacking: The Art of Exploitation”, 2nd Edition, No Starch Press, 2008.
6. Mike Shema, “Hacking Web Apps: Detecting and Preventing Web Application Security
Problems”, First edition, Syngress Publishing, 2012.
7. Bryan Sullivan and Vincent Liu, “Web Application Security, A Beginner's Guide”, Kindle
Edition, McGraw Hill, 2012.
8. Lee Allen, “Advanced Penetration Testing for Highly– Secured Environments: The Ultimate
Security Guide (Open Source: Community Experience Distilled)”, Kindle Edition, Packt
Publishing,2012.
9. Jason Grembi, “Developing Secure Software”, Delmar Cengage Learning, 2008.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 3 2 3 2 – – – 2 1 2 2 2 2 1
CO2 2 2 2 3 3 – – – 2 1 2 2 1 2 1
CO3 1 2 2 2 1 – – – 1 1 2 1 2 2 1
CO4 2 3 2 2 2 – – – 2 1 2 2 2 2 1
CO5 2 1 2 2 3 – – – 2 1 1 2 2 1 2
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
189
PRACTICALS:
1. Perform open source intelligence gathering using Netcraft, Whois Lookups, DNS
Reconnaissance, Harvester and Maltego
2. Understand the nmap command d and scan a target using nmap
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
190
PRACTICALS:
1. Launch brute– force attacks on the Linux server using Hydra.
2. Perform real– time network traffic analysis and data pocket logging using Snort
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Explain the basics of cyber security, cyber crime and cyber law
2. Classify various types of attacks and learn the tools to launch the attacks
3. Apply various tools to perform information gathering
4. Apply intrusion techniques to detect intrusion
5. Apply intrusion prevention techniques to prevent intrusion
REFERENCES:
1. AnandShinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021
2. Nina Godbole, SunitBelapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011
3. https://owasp.org/www– project– top– ten/
4. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013
5. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011
6. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007
7. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015
8. Georgia Weidman, “Penetration Testing: A Hands– On Introduction to Hacking”, No Starch
Press, 2014
9. NPTEL course, Introduction to Cyber Security,
https://onlinecourses.swayam2.ac.in/nou19_cs08/preview
CO– PO Mapping
1– low, 2– medium, 3– high, ‘– “– no correlation
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 1 1 – 1 – – – – 1 – 2 2 2
CO2 1 3 1 3 2 1 – – – – – – 2 2 1
CO3 2 1 1 1 – 1 – – – – 1 – 2 2 2
CO4 3 3 2 2 2 1 – – – – – – 2 2 3
CO5 3 2 1 1 1 1 – 1 – – 1 – 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
191
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
192
PRACTICALS:
1. Explore network monitoring tools.
2. Study to configure Firewall, VPN.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Classify the encryption techniques.
2. Illustrate the key management technique and authentication.
3. Evaluate the security techniques applied to network and transport layer
4. Discuss the application layer security standards.
5. Apply security practices for real time applications.
REFERENCES:
1. William Stallings, “Cryptography and Network Security: Principles and Practice”, Pearson, 8th
Edition, 2023, ISBN 13: 978-9357059718.
2. R.Perlman,C.Kaufman and M. Speciner, “Network Security: Private Communication in a
Public World”, Pearson Education India, 2016.
3. Gregor N. Purdy, “Linux iptables Pocket Reference: Firewalls, NAT & Accounting”, O'Reilly
Media, Inc 2004, ISBN– 13: 978– 0596005696.
4. Michael Rash, “Linux Firewalls:Attack Detection and Response”, No Starch Press, 2007,
ISBN: 978– 1– 59327– 141– 1.
5. J. Michael Stewart, “Network Security, Firewalls And VPNs”, Jones & Bartlett Learning,2nd
Edition, 2013, ISBN– 13: 978– 1284031676.
6. Michael Gregg, “The Network Security Test Lab: A Step– By– Step Guide”, John Wiley
&Sons, 2015, ISBN– 13: 978– 8126558148.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 2 – – – 2 1 2 1 2 3 1
CO2 1 1 3 2 2 – – – 2 2 1 1 3 1 2
CO3 1 2 1 1 2 – – – 3 3 1 3 2 1 3
CO4 2 2 3 2 3 – – – 3 3 2 1 2 1 3
CO5 2 1 3 2 2 – – – 2 1 1 3 2 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
193
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Explain software security development life cycle, list of attacks in Network, Host and
Information and write the consequences of the attack
1. Analyze risks in a given activity and write the impact of risk.
2. Differentiate security models and suggest best model for the given institution
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
194
REFERENCES:
1. Behrouz A. Forouzan and Debdeep Mukhopadhyay , Cryptography and Network Security:
Principles and Practice, McGraw– Hill Education, 2011
2. Information Security Handbook: A Guide for Managers, National Institute of Standards and
Technology, 2006.
3. Mark Stamp, “Information Security Principles and Practices”, John Wiley & Sons, 2011.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 2 2 1 – – 2 3 3 2
CO2 3 2 3 2 2 3 2 1 1 – 2 3 2 3 1
CO3 3 3 3 2 1 2 1 1 1 – 1 2 3 3 1
CO4 3 3 2 2 1 2 1 – 2 – 1 2 2 3 2
CO5 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
CO6 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
195
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
196
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson, 2009.
2. Afif Osseiran, Jose F. Monserrat, Patrick Marsch, (Editors), 5G Mobile and Wireless
Communications Technology, Cambridge University Press, 2016.
3. Clint Smith, Daniel Collins, “Wireless Networks”, Third Edition, McGraw Hill Publications, 2014.
4. Reza B’Far, “Mobile Computing principles”, Cambridge University Press, 2005.
5. George Aggelou (2009), Mobile Ad hoc Networks: From Wireless LANs to 4G Networks,
McGraw– Hill Education.
CO1 2 2 3 3 3 2 1 1 3 3 3 3 2 3 3
CO2 3 2 3 2 3 1 2 1 3 3 3 3 2 3 3
CO3 3 3 2 3 3 2 1 1 3 3 3 3 3 3 2
CO4 3 3 3 3 3 2 2 1 3 3 3 3 2 2 3
CO5 3 3 3 3 3 1 2 1 3 3 3 3 3 3 3
AVG 2.8 2.6 2.8 2.8 3 1.6 1.6 1 3 3 3 3 2.4 2.8 2.8
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
197
Activities
• EL – Fundamentals of Distributed Systems, Basics of Communication Networks
• Flipped classroom and activity
Activities
• EL– Basic concepts on Group Communication, Introduction to Snapshot Algorithm
• In class Activity on Message Ordering
Activities
• EL – Introduction to Mutual Exclusion , Introduction to Deadlock Detection
• In class activity on problem solving in Distributed Mutual Exclusion Algorithms
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
198
Activities
• EL – Applications for Rollback Recovery, Basics concepts of Agreement Algorithms
• Combinations of In-Class & Flipped class rooms
REFERENCES:
1. Ajay D. Kshemkalyani and Mukesh Singhal, "Distributed Computing: Principles, Algorithms,
and Systems", Cambridge University Press, 2011.
2. Tanenbaum A.S., Van Steen M., “Distributed Systems: Principles and Paradigms”, Pearson
Education, Second Edition, 2016.
3. George Coulouris, Jean Dollimore, Tim Kindberg and Gordon Blair, “Distributed Systems
Concepts and Design”, Fifth Edition, Pearson Education, 2012.
4. Pradeep K Sinha, "Distributed Operating Systems: Concepts and Design", Prentice Hall of
India, 2007.
5. Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating Systems,
McGraw Hill, 2001.
6. Liu M.L., “Distributed Computing, Principles and Applications”, Pearson Education, 2004.
7. Nancy A Lynch, “Distributed Algorithms”, Morgan Kaufmann Publishers, USA, 2003.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 2 1 1 – 1 – – 3 3 3 3
CO2 3 3 3 3 – 1 – – 1 – – 2 3 3 3
CO3 3 3 3 3 1 1 – – 1 – – 2 3 3 3
CO4 3 3 3 3 – 1 – – 1 – – 3 3 3 3
CO5 3 3 3 3 – 1 – – 1 – – 3 3 2 2
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
199
ACTIVITIES
• EL– Multimedia metadata, Multimedia databases, Hypermedia, Multimedia Learning
PRACTICALS:
Working with Image Editing tools:
• Install tools like GIMP/ InkScape / Krita / Pencil and perform editing operations
• Use different selection and transform tools to modify or improve an image
• Create logos and banners for home pages of websites.
Working with Audio Editing tools:
Install tools like, Audacity / Ardour for audio editing, sound mixing and special effects like
•
ACTIVITIES
• Exercise problems on Text compression, Image compression
• EL– Latest compression standards and formats, Text Compression, Image compression
PRACTICALS:
Working with Video Editing and Conversion tools:
• Install tools like OpenShot / Cinelerra / HandBrake for editing video content.
• Edit and mix video content, remove noise, create special effects, add captions.
• Compress and convert video file format to other popular formats.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
200
ACTIVITIES
• Creating Interactive multimedia presentations using Authoring tools / software
• EL – Latest authoring tools / frameworks, Creating Interactive multimedia presentations using
Authoring tools / software
ACTIVITIES
• Creating Animations in 2D and 3D
• EL– Designing presentations, interactive simulations
PRACTICALS:
Working with Animation tools:
Install tools like, Krita, Wick Editor, Blender:
• Perform a simple 2D animation with sprites
• Perform simple 3D animation with keyframes, kinematics
• Working with Mobile UI animation tools: Origami studio / Lottie / Framer etc.,
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
201
PRACTICALS:
Creating VR and AR applications:
• Any affordable VR viewer like Google Cardboard and any development platform like
Openspace 3D / ARCore etc.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Get the bigger picture of the context of Multimedia and its applications
2. Use the different types of media elements of different formats on content pages
3. Author 2D and 3D creative and interactive presentations for different target multimedia
applications.
4. Use different standard animation techniques for 2D, 21/2 D, 3D applications
5. Understand the complexity of multimedia applications in the context of cloud, security,
bigdata streaming, social networking, CBIR etc.,
REFERENCES:
1. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson Education, 1st
Edition, 2015.
2. Ze–Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021. (UNIT– I, II, III)
3. Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer Nature,
1st Edition, 2021
4. John M Blain, The Complete Guide to Blender Graphics: Computer Modeling & Animation,
CRC press, 8th Edition, 2024.
5. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press, 2018.
WEB REFERENCES
1. https://itsfoss.com/
2. https://www.ucl.ac.uk/slade/know/3396
3. https://handbrake.fr/
4. https://opensource.com/article/18/2/open– source– audio– visual– production– tools
5. https://camstudio.org/
6. https://developer.android.com/training/animation/overview
7. https://developer.android.com/training/animation/overview (UNIT– IV)
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 2 3 – – – 3 2 1 2 3 2 3
CO2 3 3 3 3 3 – – – 3 3 2 2 3 2 3
CO3 3 3 3 3 3 – – – 3 3 2 3 3 2 3
CO4 3 3 3 3 3 2 – – 3 3 3 3 3 3 3
CO5 3 3 3 3 3 2 – – 3 3 3 3 3 3 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
202
PRACTICALS:
Write a Movie Synopsis (Individual/Team Writing)
PRACTICALS:
1. Present team stories in class.
2. Script/Storyboard Writing (Individual Assignment)
ACTIVITIES
• EL– capturing, importing and exporting media.
• Flipped classroom and activity
PRACTICALS:
1. Pre– Production: Personnel, budgeting, scheduling, location scouting, casting, contracts &
agreements
2. Production: Single camera production personnel & equipment, Documentary Production
UNIT – IV WORKING WITH FINAL CUT PRO 6L+8P
Working with clips and the Viewer – working with sequences, Timeline, and canvas – Basic
Editing – Adding and Editing Testing Effects – Advanced Editing and Training Techniques –
Working with Audio – Using Media Tools – Viewing and Setting Preferences.
ACTIVITIES
• EL– Advanced Editing and Training Techniques using Final Cut Pro
• Flipped classroom and activity
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
203
PRACTICALS:
1. Writing Final Proposal: Overview, Media Treatments, Summary, Pitching
2. Write Documentary & Animation Treatment
ACTIVITIES
• EL– Viewing and Making Footage
• Analysis in Class
PRACTICALS:
1. Post– production: Editing, Sound design, Finishing.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Keith Underdahl, “Digital Video for Dummies”, Third Edition, Dummy Series, 2001.
2. Robert M. Goodman and Partick McGarth, “Editing Digital Video: The Complete Creative
and Technical Guide”, Digital Video and Audio, McGraw – Hill 2003.
3. Avid Xpress DV 4 User Guide, 2007.
4. Final Cut Pro 6 User Manual, 2004.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 2 1 1 1 1 1 1 2 3 2 3 1 1
CO2 2 3 3 3 1 1 1 1 1 2 2 1 1 1 1
CO3 2 2 3 3 1 1 1 1 3 1 1 1 2 1 2
CO4 2 2 2 2 1 1 2 1 3 1 1 1 2 2 2
CO5 2 1 3 3 1 1 3 1 3 2 1 2 2 2 1
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
204
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
205
PRACTICALS:
1. Repeated Games
2. Bayesian Nash equilibrium.
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Discuss the notion of a strategic game and equilibria and identify the characteristics of the
main applications of these concepts.
2. Discuss the use of Nash Equilibrium for other problems.
3. Identify key strategic aspects and based on these be able to connect them to appropriate game
theoretic concepts given a real– world situation.
4. Identify some applications that need aspects of Bayesian Games.
5. Implement a typical Virtual Business scenario using Game theory.
REFERENCES:
1. M. J. Osborne: An Introduction to Game Theory. Oxford University Press, 2012.
2. M. Machler, E. Solan, S. Zamir: Game Theory, Cambridge University Press, 2013.
3. N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani: Algorithmic Game Theory,
Cambridge University Press, 2007.
A. Dixit and S. Skeath: Games of Strategy, Second Edition. W W Norton & Co Inc, 2004.
4. YoavShoham, Kevin Leyton– Brown, Multiagent Systems: Algorithmic, Game Theoretic, and
Logical Foundations, Cambridge University Press 2008.
5. Zhu Han, DusitNiyato, WalidSaad, TamerBasar and Are Hjorungnes: Game Theory in
Wireless and Communication Networks, Cambridge University Press, 2012.
6. Y. Narahari: Game Theory and Mechanism Design, IISC Press, World Scientific, 2014.
7. William Spaniel, Game Theory 101: The Complete Textbook, Create Space Independent
Publishing, 2011.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 3 3 – – – – – – – 1 1 3
CO2 3 3 3 2 3 – – – – – – – 1 1 1
CO3 1 1 3 3 3 – – – – – – – 1 1 2
CO4 2 1 1 1 1 – – – – – – – 1 1 2
CO5 2 2 3 2 1 – – – – – – – 1 1 2
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
206
PRACTICALS:
1. Discuss an interesting case study regarding how an insurance company manages leads.
Discuss negative and positive impacts and ethical implications of using social media for political
advertising.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
207
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Examine and explore the role and importance of digital marketing in today’s rapidly
changing business environment.
2. Focuses on how digital marketing can be utilized by organizations and how its effectiveness
can be measured.
3. Know the key elements of a digital marketing strategy.
4. Study how the effectiveness of a digital marketing campaign can be measured
5. Demonstrate advanced practical skills in common digital marketing tools such as SEO,
SEM, Social media and Blogs.
REFERENCES:
1. Fundamentals of Digital Marketing by Puneet Singh Bhatia;Publisher: Pearson Education;
First edition ( July 2017);ISBN– 10: 933258737X;ISBN– 13: 978– 9332587373.
1. Digital Marketing by Vandana Ahuja ;Publisher: Oxford University Press ( April 2015). ISBN–
10: 0199455449
Marketing 4.0: Moving from Traditional to Digital by Philip Kotler;Publisher: Wiley; 1st edition
(April 2017); ISBN10: 9788126566938;ISBN 13: 9788126566938;ASIN: 8126566930.
Ryan, D. (2014 ). Understanding Digital Marketing: Marketing Strategies for Engaging the
Digital Generation, Kogan Page Limited..
Barker, Barker, Bormann and Neher(2017), Social Media Marketing: A Strategic Approach,
2E South– Western ,Cengage Learning.
Pulizzi,J Beginner's Guide to Digital Marketing , Mcgraw Hill Education
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 2 1 1 – – – 1 2 3 2 3 1 1
CO2 2 3 3 3 1 – – – 1 2 2 1 1 1 1
CO3 2 2 3 3 1 – – – 3 1 1 1 2 1 2
CO4 2 2 2 2 1 – – – 3 1 1 1 2 2 2
CO5 2 1 3 3 1 – – – 3 2 1 2 2 2 1
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
208
PRACTICALS:
Using Natron:
PRACTICALS:
Using Natron:
• Using Rotopaint
• Performing Tracking and stabilizing
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
209
PRACTICALS:
Using Blender:
• Motion Tracking – camera and object tracking
• Camera fx, color grading, vignettes
• Compositing images and video files
• Multilayer rendering
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
210
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 1 – – – 1 2 1 1 3 3 2
CO2 1 3 3 2 1 – – – 3 2 2 2 1 1 1
CO3 2 3 3 2 1 – – – 1 2 1 2 2 2 2
CO4 3 3 2 2 3 – – – 3 3 2 2 2 3 1
CO5 1 2 1 1 2 – – – 1 3 2 3 2 3 1
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
211
PRACTICALS:
1. Installation of a game engine, e.g., Godot, Blender with UPBGE or equivalent,
familiarization of the features
2. Create simple 3D models using mesh and modify the mesh
3. Performing simple transformations
UNIT – II GRAPHICS FOR GAME DEVELOPMENT -2 6L+6P
Texturing – Lighting - Illumination and Shading - Environment mapping - Fragment Processing
and output merging - Character Animation.
PRACTICALS:
1. Add materials, textures, lights, shadows to game objects
2. Implement simple character animation
3. Implement other character animation techniques like IK
UNIT – III GAME DESIGN PRINCIPLES 6L+6P
Genres - Game worlds - Character Development – storytelling - creating user experience - Game
Play - Game Script Design - Core Mechanics - Game Balancing - Level Design, Game Ethics.
PRACTICALS:
1. Conceptualize a 2D, 3D game
2. Design Game rules, mechanics
3. Create a Game design document using any standard templates
UNIT – IV GAME ENGINE 6L+6P
Game loop - Scene loop – Viewport – Modeling - Rendering - 2D Graphics - 2D Physics - 3D
Graphics - 3D Physics – Animation - Collision and Rigid Body Dynamics - Shaders – lights –
Scripting – Audio – Input – Game AI.
PRACTICALS:
1. Implement Game Physics and write scripts to manipulate game objects according to game
rules
2. Add Collision detection for game objects
3. Implement Game AI for NPCs
UNIT – V GAME DEVELOPMENT USING ANY GAME ENGINE 6L+6P
Developing 2D and 3D interactive games – Avatar Creation - 2D and 3D Graphics – Asset
Creations – Animation - Game Physics – Collision detection - Incorporating music and sound,
Exporting game.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
212
PRACTICALS:
1. Developing a simple 2D game using game engine
2. Developing 3D Game using game engine
3. Completing 3D game with all the features
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Use the concepts of 2D and 3D Graphics for Game design and Development
2. Use Game design principles to design games and create game design documents
3. Understand Rendering process and use Game Engines and platforms to develop 2D/3D
games
4. Develop Games using simple Game AI
5. Design and Implement different types of Character animation
REFERENCES:
1. Jung Hyun Han, “3D Graphics for Game Programming”, 1st Edition, Chapman and Hall/CRC,
2011.
2. Ernest Adams, “Fundamentals of Game Design”, 3rd Edition, New Riders Press, 2013.
3. Jung Hyun Han, “Introduction to Computer Graphics with OpenGL ES”, CRC Press, 1st
Edition, 2024.
4. David H. Eberly, “3D Game Engine Design: A Practical Approach to Real-Time Computer
Graphics”, Second Edition, CRC Press, 2006.
5. Sanjay Madhav, “Game Programming Algorithms and Techniques: A Platform Agnostic
Approach”, Addison Wesley, 2013.
6. Jesse Schell, “The Art of Game Design, A Book of Lenses”, Third Edition, A K Peters Ltd.,
2019.
7. Tracy Fullerton, “Game Design Workshop. A Playcentric Approach to Creating Innovative
Games”, 5th Edition, CRC Press, 2024.
8. Ian Millington, “Artificial Intelligence for Games”, Third Edition, CRC Press, 2019.
9. Jason Gregory, “Game Engine Architecture”, Third Edition, CRC Press, 2019.
10. https://www.blender.org/
11. https://upbge.org/#/
12. https://godotengine.org/
13. https://www.geometrictools.com/
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 - - 1 1 - - - 3 3 3
CO2 3 3 3 2 3 - - 1 1 - - - 3 3 3
CO3 3 3 3 2 3 - - 1 1 - - - 3 3 3
CO4 3 3 3 2 3 - - 1 1 - - - 3 3 3
CO5 3 3 3 2 3 - - 1 1 - - - 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
213
UNIT – I INTRODUCTION 9L
Graph Terminologies – Types of Graphs – Isomorphism – Operationson graphs – Degree
sequences – Euler graph – Hamiltonian Graph – Edge graph– Related theorems
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Point out the basic concepts of graphs, and different types of graphs
2. Discuss the properties, theorems and be able to prove theorems
3. Apply suitable graph models and algorithms for solving engineering problems
4. Analyse various representations of graphs
5. Analyse graph algorithms and discuss their suitability for applications
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
214
REFERENCES:
1. Narsingh Deo, "Graph Theory with Applications to Engineering and Computer Science",
Prentice– Hall of India Pvt. Ltd, 2003
2. S. Pirzada, “An Introduction to Graph theory”, University Press, 2012.
3. Frank Harary, “Graph Theory”, Narosa Publishing House, 2001.
4. West D. B., “Introduction to Graph Theory”, 2nd Edition, Pearson Education, 2001.
5. Diestel R, "Graph Theory", 5th Edition, Springer, 2017.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 3 – – – – – – – – – – 2 – –
CO2 3 3 1 – – – – – – – – 1 3 2 –
CO3 1 3 3 2 – – – – – – – 2 3 2 –
CO4 2 3 – – – – – – – – – – 1 3 –
CO5 – 3 1 3 – – – – – – – – 1 2 2
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
215
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
216
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. S.Sridhar, “Digital Image Processing”, Second Edition, Oxford University Press, 2016.
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Fourth Edition,
Pearson Education, 2018.
3. Milan Sonka, Vaclav Hlavac and Roger Boyle, ―Image Processing, Analysis and Machine
Vision, Fourth Edition, Cengage India, 2017.
4. Anil K.Jain, Fundamentals of Digital Image Processing, First Edition, Pearson Education, 2015.
5. Alasdair McAndrew, “Introduction to Digital Image Processing with MATLAB”, Cengage
Learning 2009.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 2 3 1 2 – 2 – 1 2 3 2 3
CO2 3 3 3 2 1 2 2 – 2 – 1 2 3 3 3
CO3 3 3 3 2 3 3 2 – 2 – 1 2 3 3 3
CO4 3 3 3 3 3 1 2 – 2 – 1 2 3 3 3
CO5 3 2 2 2 3 2 2 – 2 – 1 2 3 2 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
217
PRACTICALS:
1. Study of tools like Unity, Maya, 3DS MAX, AR toolkit, Vuforia and Blender
2. Use the primitive objects and apply various projection types by handling camera
PRACTICALS:
1. Download objects from asset store and apply various lighting and shading effects.
2. Model three dimensional objects using various modelling techniques and apply textures over
them.
UNIT – III AUGMENTED REALITY 6L+6P
Introduction to Augmented Reality– Augmented Reality methods– Computer vision for AR–
Interaction– Modelling and Annotation– Navigation– Wearable devices
PRACTICALS:
1. Develop AR enabled simple applications like human anatomy visualization, DNA/RNA
structure visualization and surgery simulation.
2. Develop simple MR enabled gaming applications.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
218
PRACTICALS:
1. Create three dimensional realistic scenes and develop simple virtual reality enabled mobile
applications which have limited interactivity.
2. Add audio and text special effects to the developed application.
UNIT – V APPLICATIONS 6L+6P
Human Factors in VR – Methodology and Terminology – VR Health and Safety Issues – VR
and Society– Medical Applications of VR – Military VR Applications – Emerging Applications of
VR – VR Applications in Manufacturing – Applications of VR in Robotics – Information
Visualization – VR in Business – VR in Entertainment – VR in Education.
PRACTICALS:
1. Develop VR enabled applications using motion trackers and sensors incorporating full
haptic interactivity.
2. Develop AR enabled applications with interactivity like E learning environment, Virtual
walkthroughs and visualization of historic places.
REFERENCES:
1. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create compelling VR
experiences for mobile and Desktop”, Packt Publisher, 2018
2. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016
3. John Vince, “Introduction to Virtual Reality”, Springer– Verlag, 2004.
4. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003
5. Erin Pangilinan, Steve Lukas, and Vasanth Mohan, "Creating Augmented and Virtual
Realities: Theory and Practice for Next– Generation Spatial Computing", 1st Edition, O'Reilly
Media, 2019
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
219
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 – 3 – – – 2 2 1 2 2 1 2
CO2 3 2 2 1 3 – – – 3 2 2 3 3 1 2
CO3 3 3 2 2 3 – – – 3 2 1 2 3 2 2
CO4 3 3 3 2 3 – – – 3 2 2 3 3 2 2
CO5 3 3 3 3 3 – – – 3 3 3 3 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
220
PRACTICALS:
1. Create a State Machine workflow to compare user input with a random number.
2. Build a process in the RPA platform using UI Automation Activities.
3. Create an automation process using key System Activities, Variables and Arguments.
PRACTICALS:
1. Scraping data from website and writing to CSV
2. Web Scraping
3. Email Query Processing
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
221
1. Enunciate the key distinctions between RPA and existing automation techniques and
platforms.
2. Use UiPath to design control flows and work flows for the target process
3. Implement recording, web scraping andprocess mining by automation
4. Use UIPath Studio to detect, and handle exceptions in automation processes
5. Implement and use Orchestrator for creation, monitoring, scheduling, and controlling of
automated bots and processes.
REFERENCES:
1. Learning Robotic Process Automation: Create Software robots and automate business
processes with the leading RPA tool – UiPath by Alok Mani Tripathi, Packt Publishing, 2018.
2. Tom Taulli , “The Robotic Process Automation Handbook: A Guide to Implementing RPA
Systems”, Apress publications, 2020.
3. A Gerardus Blokdyk, “Robotic Process Automation RPA Complete Guide”, 2020.
4. Frank Casale, Rebecca Dilla, Heidi Jaynes, Lauren Livingston, Introduction to Robotic
Process Automation: a Primer, Institute of Robotic Process Automation, Amazon Asia–
Pacific Holdings Private Limited, 2018.
5. Richard Murdoch, Robotic Process Automation: Guide To Building Software Robots,
Automate Repetitive Tasks & Become An RPA Consultant, Amazon Asia– Pacific Holdings
Private Limited, 2018
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
222
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 1 3 – – – 1 3 3 2 2 2 1
CO2 1 1 2 3 3 – – – 1 2 3 1 3 2 1
CO3 2 3 2 3 3 – – – 2 3 1 1 3 3 3
CO4 1 2 1 2 2 – – – 1 2 1 3 3 3 2
CO5 3 3 3 3 3 – – – 3 1 1 1 3 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
223
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
224
Workflow, Visual Analytics for Clinicians, Visual Analytics for Patients – Legal and Ethical Issues in
Clinical Decision Support Systems – Fraud Detection in Healthcare: Definition and Types of
Healthcare Fraud, Identifying Healthcare Fraud from Data, Knowledge Discovery– Based
approaches for Identifying Fraud.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand the various sources of healthcare data and perform basic analytics on those data.
2. Explore various biomedical modalities and describe the basic properties of each kind.
3. Recognize and articulate the foundational assumptions, definitions, and usage of sensors in
healthcare analytics.
4. Demonstrate application of natural language processing on healthcare data collected from
social media.
5. Apply the various advanced data analytics techniques for different real– time healthcare
applications.
REFERENCES:
1. Chandan K. Reddy and Charu C. Aggarwal, Healthcare Data Analytics, CRC Press, 2020.
2. A. Jaya, K. Kalaiselvi, Dinesh Goyal, Handbook on Intelligent Healthcare Analytics: Knowledge
Engineering with Big Data, Wiley, 2022.Frank Harary, “Graph Theory”, Narosa Publishing
House, 2001.
3. Pantea Keikhosrokiani, Big Data Analytics for Healthcare: Datasets, Techniques, Life Cycles,
Management, and Applications, Academic Press, Elsevier, 2022.
CO PO Mapping
Program Outcomes (POs) & Program Specific Outcomes (PSOs)
COURSE
OUTCOM
ES PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO PSO
1 2 3 4 5 6 7 8 9 0 1 2 1 2 3
CO1 3 3 3 3 3 1 1 2 1 1 2 3 2 2 2
CO2 3 3 3 2 3 1 1 2 1 1 2 3 2 2 2
CO3 3 3 3 3 3 1 1 2 1 1 2 3 2 2 2
CO4 3 3 3 3 3 1 2 2 3 1 2 3 2 2 2
CO5 3 3 3 3 3 2 2 2 3 1 2 3 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
225
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
226
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Jay Alammar, Maarten Grootendorst, Hands-On Large Language Models, O’Reilly Media,
Inc.,2024
2. Ozdemir, Quick Start to Large Language Models: Strategies and Best practices for using
ChatGPT and other LLMs, Addison Wesley, Pearson,2024
3. Thimura Amaratunga, Understanding Large Language Models Learning and their underlying
concepts and technologies, Apress, 2023.
4. Francois Chollet, “Deep Learning with Python,” Manning Publications, 2018.
5. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning,” MIT Press, 2017.
CO1 3 3 3 3 2 - - - - - 2 - 3 3 3
CO2 3 3 3 3 2 - - - - - 2 - 3 3 3
CO3 3 3 3 3 2 - - - - - 2 - 3 3 3
CO4 3 3 3 3 2 - - - - - 2 - 3 3 3
CO5 3 3 3 3 2 - - - - - 2 - 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
227
PRACTICALS:
1. Implementation of Deutsch’s Algorithm
2. Implementation of Deutsch– Jozsa’s Algorithm
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
228
Classical cryptography basic concepts – Private key cryptography – Shor’s Factoring Algorithm
– Quantum Key Distribution – BB84 – Ekart 91
PRACTICALS:
1. Integer factorization using Shor’s Algorithm
2. QKD Simulation
3. Mini Project such as implementing an API for efficient search using Grover’s Algorithms or
any other similar Algorithm
TOTAL: 30L + 30P = 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Parag K Lala, Mc Graw Hill Education, “Quantum Computing, A Beginners Introduction”, First
edition (1 November 2020)
2. Michael A. Nielsen, Issac L. Chuang, “Quantum Computation and Quantum Information”,
Tenth Edition, Cambridge University Press, 2010.
3. Chris Bernhardt, The MIT Press; Reprint edition,”Quantum Computing for Everyone” (8
September 2020).
4. Scott Aaronson, “Quantum Computing Since Democritus”, Cambridge University Press,
2013.
5. N. David Mermin, “Quantum Computer Science: An Introduction”, Cambridge University
Press, 2007.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 2 – – – – 2 – – – 2 3 2
CO2 3 2 2 2 – – – – 2 – – – 2 3 1
CO3 3 3 3 3 2 – – – 3 – – – 3 2 2
CO4 3 3 3 3 3 – – – 3 – – – 1 3 2
CO5 3 3 2 3 – – – – 2 – – – 1 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
229
PRACTICALS:
Install and understand Docker container, Node.js, Java and Hyperledger Fabric, Ethereum and
perform necessary software installation on local machine/create instance on cloud to run.
PRACTICALS:
1. Interact with a blockchain network. Execute transactions and requests against a blockchain
network by creating an app to test the network and its rules.
2. Deploy an asset– transfer app using blockchain. Learn app development within a
Hyperledger Fabric network.
UNIT – IV HYPERLEDGER FABRIC & ETHEREUM 6L+8P
Architecture of Hyperledger fabric v1.1 – chain code – Membership and Access control in Fabric.
Ethereum: Ethereum network, EVM, Transaction fee, Mist Browser, Ether, Gas, Solidity.
PRACTICALS:
Use blockchain to track fitness club rewards. Build a web app that uses Hyperledger Fabric to
track and trace member rewards.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
230
REFERENCES:
1. Bashir and Imran, Mastering Blockchain: Deeper insights into decentralization, cryptography,
Bitcoin, and popular Blockchain frameworks, Packt Publishing, 2017.
2. Andreas Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”, O’Reilly
Media, 2014
3. Daniel Drescher, “Blockchain Basics: A Non-Technical Introduction in 25 Steps”, First Edition,
Apress, 2017.
4. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder.
“Bitcoin and cryptocurrency technologies: A comprehensive introduction”. Princeton
University Press, 2016.
5. Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015
6. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts
for Ethereum and Blockchain”, Packt Publishing, 2018.
7. NPTEL course, Blockchain Architecture Design and Use Cases,
https://onlinecourses.nptel.ac.in/noc19_cs63/preview
8. Handbook of Research on Blockchain Technology, published by Elsevier Inc. ISBN:
9780128198162, 2020
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
231
CO – PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 1 – – – 1 – – 2 3 1 1
CO2 3 3 3 3 1 – – – 2 – – 2 1 2 1
CO3 3 3 3 3 2 – – – 3 – – 2 2 3 3
CO4 3 3 3 3 2 – – – 3 – – 2 2 3 3
CO5 3 2 3 2 3 – – – 3 – – 2 2 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
232
CS23052 METAVERSE L T P C
3 0 0 3
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand the evolution of the metaverse and its significance in the digital realm.
2. Understand the impact of immersive technologies, such as AR, VR, and MR, on the metaverse.
3. Apply key metaverse essentials in design and development processes.
4. Analyze the available SDKs, tools, and services for applying intelligence in the metaverse
5. Implement various metaverse prototypes for creating expressive arts, NFTs, and healthcare
applications.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
233
REFERENCES:
1. Cathy Hackl, Dirk Lueth, and Tommaso Di Bartolo. Navigating the metaverse: A guide to
limitless possibilities in a Web 3.0 world. John Wiley & Sons, 2022
1. Matthew Ball, Matthew. The metaverse: and how it will revolutionize everything. Liveright
Publishing, 2022
2. Eliane Schlemmer, Luciana Backes, “Learning in Metaverses: Co– Existing in Real Virtuality”,
IGI Global, 2014
2. Bruno Arnaldi, Pascal Guitton, and Guillaume Moreau, “Virtual reality and augmented reality:
Myths and realities”, John Wiley & Sons, 2014
CO1 2 3 3 3 1 1 – – 2 – – 2 3 2 3
CO2 2 3 3 3 2 1 – – 2 – – 2 3 2 3
CO3 2 3 3 3 2 1 – – 2 – 1 2 3 2 3
CO4 2 3 3 3 2 1 – – 2 – 1 2 3 2 3
CO5 2 3 3 3 2 1 – – 2 – 1 2 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
234
PRACTICALS:
1. Study the interface and basic tools in the CAD software.
2. Study 3D printer(s) including print heads, build envelope, materials used and related
support removal system(s).
PRACTICALS:
Commands for moving from 2D to 3D.
PRACTICALS:
Advanced CAD commands to navigate models in 3D space
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
235
PRACTICALS:
1. Design any four everyday objects
● Refer to web sites like Thingiverse, Shapeways and GitFab to design four everyday
objects that utilize the advantages of 3D printing
● Choose four models from a sharing site like Thingiverse, Shapeways or Gitfab.
Improve upon a file and make it your own. Some ideas include:
● Redesign it with a specific user in mind
● Redesign it for a slightly different purpose
● Improve the look of the product
REFERENCES:
1. Christopher Barnatt, 3D Printing: The Next Industrial Revolution, CreateSpace
Independent Publishing Platform, 2013.
2. Ian M. Hutchings, Graham D. Martin, Inkjet Technology for Digital Fabrication, John Wiley
& Sons, 2013.
3. Chua, C.K., Leong K.F. and Lim C.S., Rapid prototyping: Principles and applications,
second edition, World Scientific Publishers, 2010
4. Ibrahim Zeid, Mastering CAD CAM Tata McGraw– Hill Publishing Co., Second edition,
2009.
5. Joan Horvath, Mastering 3D Printing, APress, 2014.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
236
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 2 2 3 1 – – 2 – 2 2 3 2 1
CO2 3 2 3 3 3 2 – – 3 – 3 2 3 2 3
CO3 2 2 2 2 2 2 – – 2 – 2 2 3 2 2
CO4 2 2 2 2 3 2 – – 2 – 2 2 3 3 2
CO5 1 3 3 3 3 3 – – 3 – 3 3 3 3 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
237
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
238
REFERENCES:
1. Shaoshan Liu, Liyun Li, Jie Tang, Shuang Wu, Jean– Luc Gaudiot, “Creating Autonomous
Vehicle Systems”, Morgan & Claypool, 2018.
2. Umit Ozguner, Tankut Acarman, Keith Redmill, “Autonomous Ground Vehicles”, Artech
House, 2011.
3. A. R. Jha, “ Theory, design and applications of Unmanned Aerial Vehicles”, 2016.Bruno
Arnaldi, Pascal Guitton, and Guillaume Moreau, “Virtual reality and augmented reality: Myths
and realities”, John Wiley & Sons, 2014
4. "Autonomous Vehicles: Technologies, Applications, and Challenges" by Rajkumar Buyya and
Amir Vahid Dastjerdi (1st Edition, 2021)
5. Hong Cheng, “Autonomous Intelligent Vehicles Theory, Algorithms, and Implementation”,
Springer, 2011.
6. Mohinder S. Grewal, Angus P. Andrews, Chris G. Bartone, “Global Navigation Satellite
Systems, Inertial Navigation, and Integration”, Third Edition, John Wiley & Sons, 2013.
7. Kenzo Nonami, Muljiowidodo Kartidjo, “Autonomous Control Systems and Vehicles”,
Intelligent Unmanned Systems, Springer, 2013.
8. Anthony Finn, Steve Scheding, “Development and challenges for Autonomous Unmanned
Vehicles”, A compendium, Springer, 2010.
CO1 3 3 3 3 1 3 3 1 3 1 3 3 3 3 3
CO2 3 2 2 2 2 2 2 1 1 1 1 3 3 3 2
CO3 3 3 3 3 1 3 3 2 3 2 3 3 3 3 3
CO4 3 3 3 3 1 2 2 2 2 2 3 3 3 3 2
CO5 3 3 3 3 2 3 3 1 3 2 3 3 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
239
PRACTICALS:
1. Perform operations with Evidence-Based Reasoning
2. Perform Evidence-based Analysis
3. Building knowledge based agents
4. Sample Evidence-based Reasoning Task: Intelligence Analysis, Other Evidence-based
Reasoning Tasks - Cyber Insider Threat Discovery and Analysis, Analysis of Wide-Area
Motion Imagery
PRACTICALS:
PRACTICALS:
1. Construction of Ontology for a given domain
2. Hands On: Developing a Hierarchy of Concepts and Instances
3. Hands On: Developing a Hierarchy of Features
4. Hands On: Defining Instances and Their Features
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
240
PRACTICALS:
1. Perform analysis based on learned patterns
2. Example for Inductive concept learning
3. Implementation of machine learning concepts - Inductive Learning, Explanation-based
Learning, Learning by Analogy, Multistrategy Learning
REFERENCES:
1. Gheorghe Tecuci, Dorin Marcu, Mihai Boicu, David A. Schum, Knowledge Engineering
Building Cognitive Assistants for Evidence– based Reasoning, Cambridge University
Press, First Edition, 2016.
1. Ronald J. Brachman, Hector J. Levesque: Knowledge Representation and Reasoning,
Morgan Kaufmann, 2004.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
241
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 1 1 – – 1 2 1 2 1 1 1
CO2 3 2 3 2 2 – – – 2 1 2 1 3 3 1
CO3 2 2 3 2 2 – – – 3 2 2 2 3 2 3
CO4 2 2 3 1 1 – – – 2 2 2 2 2 1 1
CO5 2 2 2 1 1 – – – 2 1 1 1 2 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
242
SOFT COMPUTING L T P C
CS23056
2 0 2 3
PRACTICALS:
Implementation of fuzzy control/ inference system
PRACTICALS:
1. Programming exercises on maximizing a function using Genetic algorithm
2. Implementation of Genetic Algorithm for Travelling Salesman Problem
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
243
PRACTICALS:
1. Implementation of three input non–linear function using ANFIS
2. Implementation of ANFIS for Automobile MPG Prediction
REFERENCES:
1. J. S. R. Jang, C. T. Sun and E. Mizutani, "Neuro-Fuzzy and Soft Computing: A
Computational Approach to Learning and Machine Intelligence", Pearson India, 2015.
2. Himanshu Singh, Yunis Ahmad Lone, "Deep Neuro– Fuzzy Systems with Python With Case
Studies and Applications from the Industry", Apress, 2020.
3. Saroj Kaushik and Sunita Tiwari, "Soft Computing– Fundamentals Techniques and
Applications", 1st Edition, McGraw Hill, 2018.
4. Simon Haykin, "Neural Networks and Learning Machines", 3rd Edition, Pearson, 2016.
5. Hung T. Nguyen, Carol Walker, Elbert A. Walker, " A First Course in Fuzzy Logic
6. S.N. Sivanandam, S.N. Deepa, "Principles of Soft Computing", Third Edition, Wiley India Pvt
Ltd, 2019.
7. Oliver Kramer, "Genetic Algorithm Essentials", Springer, 2017.
8.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
244
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 1 1 – – 1 2 1 2 1 1 1
CO2 2 2 3 1 1 – – – 2 2 2 2 2 1 1
CO3 2 2 3 2 2 – – – 3 2 2 2 3 2 3
CO4 2 2 3 1 1 – – – 2 2 2 2 2 1 1
CO5 2 2 3 2 2 – – – 3 2 2 2 3 2 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
245
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
246
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand the basics of Shallow Neural Networks and Deep Neural Networks.
2. Get familiar with concepts of Machine Vision and deep learning models for Image classification
and Object Detection.
3. Understand sequence data and RNN networks and its variants.
4. Understand generative Adversarial Networks and Transformer Architectures like BERT and
GPT.
5. Design and implement Deep– Q learning and DQN algorithms.
REFERENCES:
1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning,” MIT Press, 2017.
2. Andrew Glassner, “Deep Learning – A visual Approach,” No Starch Press, 2021.
3. Francois Chollet, “Deep Learning with Python,” Manning Publications, 2021.
4. Jon Krohn,” Deep Learning Illustrated: A Visual, Interactive Guide to Artificial Intelligence,”
Addison– Wesley, 2020.
CO1 3 3 3 3 2 1 1 1 1 1 2 1 3 3 3
CO2 3 3 3 3 2 1 1 1 1 1 2 1 3 3 3
CO3 3 3 3 3 2 1 1 1 1 1 2 1 3 3 3
CO4 3 3 3 3 2 1 1 1 1 1 2 1 3 3 3
CO5 3 3 3 3 2 1 1 1 1 1 2 1 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
247
PRACTICALS:
1. Create Regular expressions in Python for detecting word patterns and tokenizing text
2. Getting started with Python and NLTK – Searching Text, Counting Vocabulary, Frequency
Distribution, Collocations, Bigrams
3. Accessing Text Corpora using NLTK in Python
4. Write a function that finds the 50 most frequently occurring words of a text that are not stop
words
PRACTICALS:
1. Implement the Word2Vec model
2. Use a transformer for implementing classification
PRACTICALS:
1. Design a chatbot with a simple dialog system
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
248
1. Explain existing and emerging deep learning architectures for text and speech processing
2. Apply deep learning techniques for NLP tasks, language modelling and machine translation
3. Explain coreference and coherence for text processing
4. Build question– answering systems, chatbots, and dialogue systems
5. Apply deep learning models for building speech recognition and text– to– speech systems
REFERENCES:
1. Daniel Jurafsky and James H. Martin: Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics, and Speech Recognition”,
Third Edition, 2022.
2. Dipanjan Sarkar: Text Analytics with Python: A Practical Real– World approach to Gaining
Actionable insights from your data, APress,2018
3. Tanveer Siddiqui, Tiwary U S: Natural Language Processing and Information Retrieval,
Oxford University Press, 2008.
4. Lawrence Rabiner, Biing– Hwang Juang, B. Yegnanarayana: Fundamentals of Speech
Recognition, 1st Edition, Pearson, 2009.
5. Steven Bird, Ewan Klein, and Edward Loper: Natural language processing with Python,
O’REILLY. 1st Edition, 2009.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 1 3 – – – 1 2 1 2 1 1 1
CO2 3 1 2 1 3 – – – 2 2 1 3 3 2 1
CO3 2 2 1 3 1 – – – 3 3 1 2 3 3 1
CO4 2 1 1 1 2 – – – 2 1 2 2 3 1 1
CO5 1 3 2 2 1 – – – 3 2 1 1 2 3 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
249
PRACTICALS:
1. Solving simplex minimization problems using R programming
2. Solving mixed constraints problems – Big M & Two phase method using TORA
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
250
REFERENCES:
1. Hamdy A Taha: Operations Research: An Introduction, Pearson, 10th Edition, 2017.
2. ND Vohra: Quantitative Techniques in Management, Tata McGraw Hill, 4th Edition, 2011.
3. J. K. Sharma: Operations Research Theory and Applications, Macmillan, 5th Edition, 2012.
4. Hiller F.S, Liberman G.J: Introduction to Operations Research, 10th Edition McGraw Hill, 2017.
5. Jit. S. Chandran, Mahendran P. Kawatra, KiHoKim: Essentials of Linear Programming, Vikas
Publishing House Pvt.Ltd. New Delhi, 1994.
6. Ravindran A., Philip D.T., and Solberg J.J.: Operations Research, John Wiley, 2nd Edition,2007
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 1 1 – – 1 2 1 2 1 1 1
CO2 2 2 3 1 1 – – – 2 2 2 2 2 1 1
CO3 2 2 3 2 2 – – – 3 2 2 2 3 2 3
CO4 2 2 3 1 1 – – – 2 2 2 2 2 1 1
CO5 2 2 2 1 1 – – – 2 1 1 1 2 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
251
PRACTICALS:
1. Create a social network with yourself as the central node and minimum of 50 friend nodes
using Facebook entries using tools like Protégé / Vizter / Touchgraph
2. Calculate the graph parameters
3. Finding the network related properties such as Degree Distribution, Path length, Centrality of
random nodes
PRACTICALS:
1. Understand the XML document format for Ontologies
2. Creating an ontology using protégé tool
3. Creating a sample RDF document for the ontology created
4. Checking the validity of the RDF documents using any validator tool
PRACTICALS:
1. Create an OWL file which incorporates all the constraints and obtain inferences
2. Try to detect communities from FOAF Profiles/ Social networking sites
3. Mine the community using any one of the community mining algorithm and find patterns
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
252
Understanding and predicting human behavior for social communities – User data management
– Inference and Distribution – Enabling new human experiences – Reality mining – Context –
Awareness
PRACTICALS:
1. Mine the FOAF network and recommend interests of users to other people in the network
2. Predict the behavior of community based on human behavior prediction algorithm
Predict the behavior of a person from online social networks
PRACTICALS:
1. Visualize the social networks using tools like Vizter, Touch graph
2. Visualize the bibliography network for coauthorship networks
3. Use tweepy to extract tweets and perform set wise operations
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. R. Zafarani, M. Abbasi, and H. Liu, Social Media Mining: An Introduction, Cambridge
University Press, 2014.
2. Peter Mika, Social networks and the Semantic Web, Springer, First Edition 2007.
3. BorkoFurht, Handbook of Social Network Technologies and Applications, Springer, First
Edition, 2010.
4. Matthew A. Russell, Mining the Social Web, O‟Reilly Media, Second Edition, 2013.
5. Colleen McCue, Data Mining and Predictive Analysis: Intelligence Gathering and Crime
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
253
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 2 1 1 1 – – – 1 2 3 3 1
CO2 3 2 3 2 2 2 1 – – – 1 2 3 3 1
CO3 3 3 3 2 3 3 1 – 1 – 1 3 3 3 3
CO4 2 2 3 2 2 2 3 – 1 – 1 3 3 3 3
CO5 3 3 2 3 2 2 2 – 1 – 1 2 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
254
PRACTICALS:
Demonstration of Mathematical functions using Web PPL
PRACTICALS:
Developing an Application using a conditional inference learning model
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
255
PRACTICALS:
1. Application development using a hierarchical model
2. Application development using the Mixture model
REFERENCES:
1. Vijay V Raghavan, Venkat Gudivada, VenuGovindaraju, C.R. Rao: Cognitive Computing:
Theory and Applications: (Handbook of Statistics 35), Elsevier publications, 2016.
2. Vijay V Raghavan, Venkat Gudivada, VenuGovindaraju, C.R. Rao: Cognitive Computing:
Theory and Applications: (Handbook of Statistics 35), Elsevier publications, 2016.
3. Robert A. Wilson, Frank C. Keil: The MIT Encyclopedia of the Cognitive Sciences, The MIT
Press, Bradford Books; Reprint edition September 1, 2001.
4. Jose Luis Bermúdez: Cognitive Science – An Introduction to the Science of the Mind,
Cambridge University Press 2020.
5. Noah D. Goodman, Andreas Stuhlmuller: The Design and Implementation of Probabilistic
Programming Languages, Electronic version of book, https://dippl.org/.
6. Noah D. Goodman, Joshua B. Tenenbaum, The Prob Mods Contributors: Probabilistic
Models of Cognition, Second Edition, 2016, https://probmods.org/.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 2 2 – – – 1 1 2 2 1 2 2
CO2 2 2 1 1 2 – – – 3 2 3 1 2 3 2
CO3 1 3 1 3 3 – – – 1 3 1 3 3 1 2
CO4 2 1 1 2 3 – – – 1 2 3 1 3 3 1
CO5 1 2 3 2 2 – – – 1 2 2 2 2 2 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
256
CS23062 RESPONSIBLE AI L T P C
3 0 0 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
257
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. State the aspects of Responsible AI, such as fairness, bias, privacy etc.
2. Enforce fairness in models and mitigate bias in data.
3. Understand the importance of explainability and interpretability in AI systems.
4. Implement strategies to manage safety, security and privacy in AI systems.
5. Evaluate the societal impact of AI applications.
REFERENCES:
1. Virginia Dignum, “Responsible Artificial Intelligence: How to Develop and Use AI in a
Responsible Way”, 2019.
2. Adnan Masood, Heather Dawe, “Responsible AI in the Enterprise”, 2023.
3. Beena Ammanath, “Trustworthy AI”, O’ Reilly, 2022.
4. Christoph Molnar “Interpretable Machine Learning”, 1st edition, 2019.
5. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition, 2012.
6. Silja Voeneky, Philipp Kellmeyer et. al, “The Cambridge Handbook of Responsible Artificial
Intelligence”, Cambridge University Press, 2022.
7. I Almeida, “Responsible AI in the Age of Generative Models: Governance, Ethics and Risk
Management”, 2024.
CO1 2 2 2 2 2 – – – – – 2 2 3 3 3
CO2 3 3 3 3 3 – – – 2 – 2 2 3 2 3
CO3 3 3 3 2 3 – – – 2 – 2 2 3 2 3
CO4 3 3 3 2 3 – – – 2 – 2 2 3 2 3
CO5 2 2 2 2 3 – – – 2 – 2 2 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
258
L T P C
CS23063 GENERATIVE AI
3 0 0 3
UNIT I INTRODUCTION TO GEN AI 9
Historical Overview of Generative Modeling – Difference between Gen AI and Discriminative Modeling –
Importance of Generative Models in AI and Machine Learning – Types of Generative Models – GANs,
VAEs, Autoregressive Models and Vector Quantized Diffusion Models – Understanding of Probabilistic
Modeling and Generative Process – Challenges of Generative Modeling – Future of Gen AI – Ethical
Aspects of AI – Responsible AI – Use Cases.
UNIT II GENERATIVE MODELS FOR TEXT 12
Language Models Basics – Building Blocks of Language Models – Transformer Architecture – Encoder
and Decoder – Attention Mechanisms – Generation of Text – Models like BERT and GPT Models –
Generation of Text – Autoencoding – Regression Models – Exploring ChatGPT – Prompt Engineering –
Designing Prompts– Revising Prompts using Reinforcement Learning from Human Feedback (RLHF) –
Retrieval Augmented Generation – Multimodal LLM – Issues of LLM like hallucination.
UNIT III GENERATION OF IMAGES 9
Introduction to Generative Adversarial Networks – Adversarial Training Process – Nash Equilibrium –
Variational Autoencoders – Encoder– Decoder Architectures – Stable Diffusion Models – Introduction to
Transformer based Image Generation – CLIP – Visual Transformers ViT– Dall– E2 and Dall– E3, GPT-
4V – Issues of Image Generation Models like Mode Collapse and Stability.
UNIT IV GENERATION OF PAINTING, MUSIC, AND PLAY 6
Variants of GAN – Types of GAN – Cyclic GAN – Using Cyclic GAN to Generate Paintings – Neural Style
Transfer – Style Transfer – Music Generating RNN – MuseGAN – Autonomous agents – Deep Q
Algorithm – Actor-Critic Network.
UNIT V OPEN SOURCE MODELS AND PROGRAMMING FRAMEWORKS 9
Training and Fine-tuning of Generative Models – GPT4All – Transfer Learning and Pre-trained Models –
Training Vision Models – Google Copilot – Programming LLM – LangChain – Open Source Models –
Llama – Programming for TimeSformer – Deployment – Hugging Face.
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon successful completion of the course, the student will be able to:
CO 1. Understand the concepts of Generative Modeling.
CO 2. Apply Gen AI to Generating Texts.
CO 3. Understand and Apply Gen AI for generating video.
CO 4. Apply Gen AI for Video, painting, and Music Generation.
CO 5. Apply Open Source Tools for solving problems using Gen AI.
TEXT BOOKS:
1. Denis Rothman, Transformers for Natural Language Processing and Computer Vision – Third
Edition, Packt Books, 2024
REFERENCES:
1. Generative Deep Learning, David Foster, O’Reily Books, 2024.
2. Generative AI for Everyone – Altaf Rehmani – BlueRose One – 2024.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
259
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
260
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
261
REFERENCES
COURSE OUTCOMES:
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
262
Building a network, Network edge and core – Layered Architecture, ISO/OSI Model, Internet
Architecture (TCP/IP) – ) Networking Devices: Hubs, Bridges, Switches, Routers, and
Gateways – Performance Metrics – Application Layer protocols – HTTP – FTP – Email –
DNS
Inside a Router – Internet Protocols – IPV4, IPV6, IP Addressing and NAT – Subnetting –
Variable Length Subnet Mask (VLSM) – Classless Inter– Domain Routing (CIDR)
Distance Vector Routing – Link State Routing – RIP – OSPF – BGP – ICMP – DHCP –
Introduction to Quality of Services (QoS)
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
263
REFERENCES
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
• Highlight the significance of the functions of each layer in the network
• Identify the devices and protocols to design a network and implement it
• Build network applications using the right set of protocols and estimate their performance
• Apply addressing principles such as subnetting and VLSM for efficient routing
• Explain media access techniques
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 1 1 1 – – – – – 3 2 2
CO2 3 3 3 3 2 1 1 – 3 – – 2 3 3 2
CO3 3 3 3 3 2 1 1 – 3 – – 2 3 3 3
CO4 3 3 3 2 1 1 1 – – – – 2 3 3 1
CO5 3 3 3 2 1 1 1 – 1 – – 1 3 1 1
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
264
L T P TCP Credits
CS23066 ETHICAL HACKING
2 0 2 4 3
COURSE OBJECTIVES:
• To understand the basics of computer based vulnerabilities.
• To explore different foot printing, reconnaissance and scanning methods.
• To expose the enumeration and vulnerability analysis methods.
• To understand hacking options available in Web and wireless applications.
• To explore the options for network protection.
• To practice tools to perform ethical hacking to expose the vulnerabilities.
UNIT I INTRODUCTION 6
Ethical Hacking Overview – Principles of Ethical hacking– Hacking Methodologies– Role of
Ethical Hacker– Scope & limitations of hacking – Cyber Threats and Attacks Vectors– Policies
and Controls
UNIT V ATTACKS 6
SQL Injection – DOS Attacks – Session Hijacking– System Hacking– Web application security
risks – Web server attacks
Total: 30 Periods
PRACTICAL EXERCISES 30 Periods
FOCA : http://www.informatica64.com/foca.aspx.
Nessus : http://www.tenable.com/products/nessus.
Wireshark : http://www.wireshark.org.
Armitage : http://www.fastandeasyhacking.com/.
Kali or Backtrack Linux, Metasploitable, Windows XP
1. Install Kali or Backtrack Linux / Metasploitable/ Windows XP.
2. Practice the basics of reconnaissance.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
265
3. Using FOCA / SearchDiggity tools, extract metadata and expanding the target list.
4. Aggregate information from public databases using online free tools like Paterva’s
Maltego.
5. Information gathering using tools like Robtex.
6. Scan the target using tools like Nessus.
7. View and capture network traffic using Wireshark.
8. Automate dig for vulnerabilities and match exploits using Armitage.
Total: 60 Periods
TEXT BOOKS
1. Stuart McClure, Joel Scambray and Goerge Kurtz, Hacking Exposed 7: Network
Security Secrets & Solutions, Tata Mc Graw Hill Publishers, 2010.
2. Bensmith, and Brian Komer, Microsoft Windows Security Resource Kit, Prentice
Hall of India, 2010.
3. Desai, Manthan M., “Hacking for Beginners: A beginners guide to learn ethical
hacking”, Hacking Tech, 2013.
4. Michael T. Simpson, Kent Backman, and James E. Corley, Hands– On Ethical
Hacking and Network Defense, Course Technology, Delmar Cengage Learning,
2010.
5. Patrick Engebretson, The Basics of Hacking and Penetration Testing, SYNGRESS,
Elsevier, 2013.
6. Dafydd Stuttard and Marcus Pinto, The Web Application Hacker’s Handbook:
Finding and Exploiting Security Flaws, 2011.
REFERENCES
1. Justin Seitz, Black Hat Python: Python Programming for Hackers and Pentesters,
2014.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
• Express knowledge on basics of computer based vulnerabilities.
• Gain understanding on different foot printing, reconnaissance and scanning methods.
• Demonstrate the enumeration and vulnerability analysis methods
• Gain knowledge on hacking options available in Web and wireless applications.
• Acquire knowledge on the options for network protection.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
266
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 3 2 1 1 1 1 1 2 2 1 1 2 3
CO2 1 2 1 2 1 1 1 1 2 2 1 1 1 2 2
CO3 2 2 3 3 1 1 1 1 1 2 1 2 2 3 1
CO4 2 1 1 2 1 1 1 1 1 3 3 3 3 2 1
CO5 2 3 1 1 2 1 1 1 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
267
L T P TCP Credits
CS23067 CYBER SECURITY
2 0 2 4 3
COURSE OBJECTIVES:
• To learn cybercrime and cyberlaw.
• To understand the cyber attacks and tools for mitigating them.
• To understand information gathering.
• To learn how to detect a cyber attack.
• To learn how to prevent a cyber attack.
UNIT I INTRODUCTION 6
Need for Cyber security – History of Cyber security – Defining Cyberspace and Cyber security–
Standards – CIA Triad – Cyber security Framework
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
268
Total: 30 Periods
TEXT BOOKS
1. Stallings, William, “Effective cybersecurity: a guide to using best practices and
standards”, Addison– Wesley Professional, 2018.
2. AnandShinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
Notion Press, 2021
3. Nina Godbole, SunitBelapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011
4. https://owasp.org/www– project– top– ten/
REFERENCES
Course Outcomes:
Upon completion of the course, the students will be able to
• Explain the basics of cyber security, cyber crime and cyber law
• Classify various types of attacks and learn the tools to launch the attacks
• Apply various tools to perform information gathering
• Apply intrusion techniques to detect intrusion
• Apply intrusion prevention techniques to prevent intrusion
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
269
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 1 1 – 1 – – – – 1 – 2 2 2
CO2 1 3 1 3 2 1 – – – – – – 2 2 1
CO3 2 1 1 1 – 1 – – – – 1 – 2 2 2
CO4 3 3 2 2 2 1 – – – – – – 2 2 3
CO5 3 2 1 1 1 1 – 1 – – 1 – 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
270
UNIT I INTRODUCTION 6
Computer Forensics Fundamentals – Types of Computer Forensics Technology – Types of
Computer Forensics Systems – Vendor and Computer Forensics Services
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
271
REFERENCES
1. Bill Nelson, Amelia Phillips and Christopher Steuart, ―Guide to Computer Forensics and
Investigations ‖, Fourth Edition, Cengage, 2013.
2. Marie– Helen Maras, “Computer Forensics: Cybercriminals, Laws, and Evidence”, Jones
& Bartlett Learning; 2nd Edition, 2014.
3. Majid Yar, “Cybercrime and Society”, SAGE Publications Ltd, Hardcover, 2nd Edition,
2013.
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 3 2 1 – – – 1 2 2 1 1 2 3
CO2 1 2 1 2 1 – – – 2 2 1 1 1 2 2
CO3 2 2 3 3 1 – – – 1 2 1 2 2 3 1
CO4 2 1 1 2 1 – – – 1 3 3 3 3 2 1
CO5 2 3 1 1 2 – – – 2 1 1 1 1 1 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
272
UNIT I INTRODUCTION 9
Introduction to Cryptography – Discrete Logarithms – Security Levels – Basics of Number Theory
– Fermat and Euler’s Theory – Euclidian’s Algorithm – Primality Testing – Chinese Remainder
Theorem – Finite Fields of the form GF(P) – Modular Exponentiation
1. Paar, Christof, and Jan Pelzl, “Understanding cryptography: a textbook for students and
practitioners”, Springer Science & Business Media, 2009.
2. William Stallings, “Cryptography and Network Security: Principles and Practices”,
Eighth Edition, Pearson Education, 2020.
3. Kahate, Atul. "Cryptography and Network Security”, Tata McGraw– Hill, 4th reprint,
2005.
4. Jon Erickson, “Hacking: The Art of Exploitation”, 2nd Edition, Starch Press, 2008.
References
1. N. Ferguson, B. Schneier, and T. Kohno. “Cryptography Engineering: Design
Principles and Practical Applications”. Wiley, 2010.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
273
2. Neil Daswani, Christoph Kern, and Anita Kesavan, “Foundations of Security: What
Every Programmer Needs to Know”, Frist Edition, Apress, 2007.
3. “The Shellcoder's Handbook: Discovering and Exploiting Security Holes”, 2nd Edition
by Chris Anley et al, 2007
Course Outcomes:
Upon completion of the course, the students will be able to
● Discuss various exploitations present in the security.
● Illustrate the basic concepts of encryption and decryption for secure data transmission.
● Develop solutions for security problems
● Analyze various cryptography techniques and their applications
● Learn the various network security techniques and their characteristics.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 1 1 2 2 1 1 – – 2 2 2 3
CO2 3 3 2 2 2 3 2 1 1 – – 2 2 3 2
CO3 3 2 2 1 1 2 2 – 1 – – 2 3 1 1
CO4 3 3 3 1 2 3 2 1 1 – – 2 3 3 3
CO5 3 3 3 1 2 3 2 1 1 – – 2 3 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
274
TEXT BOOKS
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In– depth Guide to Mobile Device Forensics”, First Edition, CRC
Press, 2022.
REFERENCES
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles
River Media, 2005, ISBN: 1– 58450– 389.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1: Have knowledge on digital forensics.
CO2: Know about digital crime and investigations.
CO3: Being forensic ready.
CO4: Investigate, identify and extract digital evidence from iOS devices.
CO5: Investigate, identify and extract digital evidence from Android devices.
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
275
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 2 1 – – – 1 1 3 3 1 3 1
CO2 3 3 3 3 3 – – – 2 2 1 2 1 3 1
CO3 3 3 2 3 1 – – – 3 2 1 1 3 2 3
CO4 3 1 2 2 3 – – – 1 3 3 2 1 3 3
CO5 1 3 2 3 2 – – – 2 3 2 3 1 2 1
1 – low, 2 – medium, 3 – high, '– ' – no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
276
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain software security development life cycle, list of attacks in Network, Host and
Information and write the consequences of the attack
CO2:Analyze risks in a given activity and write the impact of risk.
CO3:Differentiate security models and suggest best model for the given institution
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
277
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 2 2 1 – – 2 3 3 2
CO2 3 2 3 2 2 3 2 1 1 – 2 3 2 3 1
CO3 3 3 3 2 1 2 1 1 1 – 1 2 3 3 1
CO4 3 3 2 2 1 2 1 – 2 – 1 2 2 3 2
CO5 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
CO6 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
278
OPEN ELECTIVES
CS23901 DATA MINING L T P C
3 0 0 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
279
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan
Kaufmann Publishers, Third Edition, 2011.
2. G. K. Gupta, Introduction to Data Mining with Case Studies, Eastern Economy Edition,
Prentice Hall of India, 2006.
3. Mehmed Kantardzic, Data mining Concepts, Models, Methods, and Algorithms, Wiley 2011.
4. Alex Berson and Stephen J. Smith, Data Warehousing, Data Mining and OLAP, Tata McGraw
Hill Edition, Tenth Reprint, 2007.
5. Ian.H.Witten, Eibe Frank and Mark.A.Hall, Data Mining: Practical Machine Learning Tools
and Techniques, Morgan Kaufmann, Third Edition, 2011.
6. Bruce Ratner, Statistical and Machine – Learning Data Mining: Techniques for Better
Predictive Modeling and Analysis of Big Data, CRC Press, Second Edition, 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 1 1 1 – 1 1 3 – – 1 2 1 2 –
CO2 3 3 3 3 3 3 2 1 3 – 1 2 3 3 1
CO3 3 3 3 3 3 3 2 1 3 – 1 2 3 3 2
CO4 3 3 3 3 3 3 2 1 2 – – 3 3 3 3
CO5 3 3 3 3 3 3 2 – 1 – 1 2 3 3 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
280
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
281
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Explain software security development life cycle, list of attacks in Network, Host and
Information and write the consequences of the attack
2. Analyze risks in a given activity and write the impact of risk.
3. Differentiate security models and suggest best model for the given institution
4. Differentiate the functions of IDS and Firewall
5. Explain the features of digital certificate
6. Document security policies and management activities for an organization.
REFERENCES:
1. Behrouz A. Forouzan and Debdeep Mukhopadhyay , Cryptography and Network Security:
Principles and Practice, McGraw– Hill Education, 2011
2. Information Security Handbook: A Guide for Managers, National Institute of Standards and
Technology, 2006.
3. Mark Stamp, “Information Security Principles and Practices”, John Wiley & Sons, 2011.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 2 2 1 – – 2 3 3 2
CO2 3 2 3 2 2 3 2 1 1 – 2 3 2 3 1
CO3 3 3 3 2 1 2 1 1 1 – 1 2 3 3 1
CO4 3 3 2 2 1 2 1 – 2 – 1 2 2 3 2
CO5 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
CO6 3 2 2 1 1 2 1 – 1 – 1 1 2 2 2
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
282
UNIT – I INTRODUCTION 9L
Project – Software Projects versus Other Types of Project – Contract Management and Technical
Project Management – Activities covered by Software Project Management – Overview of
stepwise project planning. Project evaluation: Strategic assessment, Technical assessment, Cost–
Benefit Analysis, Cash– flow forecasting, Cost– Benefit Evaluation Techniques, Risk Evaluation
TOTAL: 45 PERIODS
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
283
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
REFERENCES:
1. Bob Hughes, Mike Cotterell, “Software Project Management”, Fourth Edition, Tata McGraw
Hill, 2006.
2. Royce Walker,”Software Project Management”, Pearson Education, 1999.
3. Adolfo Villafiorita,” Introduction to Software Project Management”,Auerbach publication First
Edition, 2016.
4. Ashfaque Ahmed, “Software Project Management: A Process– Driven Approach”, First
Edition, CRC Press, 2012.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 2 – 2 2 3 2 2 2 3
CO2 3 3 3 3 2 2 3 – 2 2 3 3 1 3 3
CO3 3 3 3 2 1 2 2 – 2 2 3 2 1 3 3
CO4 3 3 3 3 3 2 2 – 2 2 3 1 1 3 3
CO5 3 3 3 1 2 2 3 – 2 3 3 3 1 3 3
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
284
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments
285
3. Apply and develop new techniques in the areas of image enhancement restoration–
segmentation– compression– wavelet processing and image morphology.
4. Critically analyze different approaches to different modules of Image Processing.
5. Build and use any simple Image Classifier using standard approaches
REFERENCES:
1. S.Sridhar, “Digital Image Processing”, Second Edition, Oxford University Press, 2016.
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Fourth Edition,
Pearson Education, 2018.
3. Milan Sonka, Vaclav Hlavac and Roger Boyle, ―Image Processing, Analysis and Machine
Vision, Fourth Edition, Cengage India, 2017.
4. Anil K.Jain, Fundamentals of Digital Image Processing, First Edition, Pearson Education,
2015.
5. Alasdair McAndrew, “Introduction to Digital Image Processing with MATLAB”, Cengage
Learning 2009.
CO– PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 2 2 3 1 2 – 2 – 1 2 3 2 3
CO2 3 3 3 2 1 2 2 – 2 – 1 2 3 3 3
CO3 3 3 3 2 3 3 2 – 2 – 1 2 3 3 3
CO4 3 3 3 3 3 1 2 – 2 – 1 2 3 3 3
CO5 3 2 2 2 3 2 2 – 2 – 1 2 3 2 3
1– low, 2– medium, 3– high, ‘– “– no correlation
Prepared by
(Name & Signature) HoD^ HoD – CSE & CT FCP
^ Applicable to only courses Offered by other Departments